Raytheon Developing Machine Learning that will Communicate what it Learned – Financialbuzz.com

Raytheon Company (NYSE: RTN) announced that it is developing a machine learning technology under a$6 millioncontract from the Defense Advanced Research Projects Agency for the Competency Aware Machine Learning program. According to the defense contractor and technology company, Systems will be able to communicate the abilities they have learned, the conditions under which the abilities were learned, the strategies they recommend and the situations for which those strategies can be used.

Ilana Heintz, principal investigator for CAML at Raytheon BBN Technologies explained that, The CAML system turns tools into partners It will understand the conditions where it makes decisions and communicate the reasons for those decisions.

The machine learning technology will learn from a video game like process. Meaning that instead of giving the system a specific set of rules, the developers will tell the system what choice it has in the game and what the end goal is. By repeatedly playing the game, the system will learn the most effective ways to meet the goal. When successful, the system will then explain itself, by recording the conditions and strategies it used to come up with successful outcomes.

People need to understand an autonomous systems skills and limitations to trust it with critical decisions, added Heintz.

Raytheon also reported that when the system has developed these skills, the team will apply it to a simulated search and rescue mission. Users will create the conditions of the mission, and in the meanwhile the system will make recommendations and give users information about its capability under the specific conditions. For example, the system might say, In the rain, at night, I can distinguish between a person and an inanimate object with 90 percent accuracy, and I have done this over 1,000 times.

Go here to read the rest:
Raytheon Developing Machine Learning that will Communicate what it Learned - Financialbuzz.com

Postdoc Research Assoc./Senior Research Assoc. – Image Processing/Computer Vision & Machine Learning job with LANCASTER UNIVERSITY | 192791 -…

Postdoctoral Research Associate/ Senior Research Associate in Image Processing/ Computer Vision and Machine Learning

In search of uniqueness harnessing anatomical hand variation (H-unique)

School of Computing and Communications

Salary: 28,331- 40,322

Closing Date: 29 February 2020

Interview Date: Mid-March 2020

Contract: Fixed Term

H-unique is a five year, 2.5M ERC-funded programme of research, led by Lancaster University. This will be the first multimodal automated interrogation of visible hand anatomy, through analysis and interpretation of human variation. This exciting research opportunity has arisen directly from the ground-breaking research undertaken by Prof Dame Sue Black in relation to the forensic identification of individuals from images of their anatomy captured in criminal cases.

Assessment of the evidential robustness of hand identification for prosecutorial purposes requires the degree of uniqueness in the human hand to be assessed through large volume image analysis. The research opens up the opportunity to develop new and exciting biometric capabilities with a wide range of real-world applications, from security access to border control whilst assisting the investigation of serious and organised crime on a global level.

This is an interdisciplinary project, supported by anatomists, anthropologists, geneticists, bioinformaticians, image analysts and computer scientists. We are investigating inherent and acquired variation in search of uniqueness, as the hand retains and displays a multiplicity of anatomical variants formed by different aetiologies (genetics, development, environment, accident etc).

The primary aim of the H-Unique project is the successful analysis and interpretation of anatomical variation in images of the human hand. This will be achieved by developing new image processing/computer vision methods to extract key features from human hand images (e.g. vein pattern, skin knuckle creases, tattoos, pigmentation pattern) in a way that is robust to changes in viewpoint, illumination, background, etc. The project will be successful if no two hands can be found to be identical, implying uniqueness. Large datasets are vital for this work to be legally admissible. Through citizen engagement with science, this research will collect images from over 5,000 participants, creating an active ground-truth dataset. It will examine and address the effects of variable image conditions on data extraction and will design algorithms that permit auto-pattern searching across large numbers of stored images of variable quality. This will provide a major novel breakthrough in the study of anatomical variation, with wide ranging, interdisciplinary and transdisciplinary impact.

We are seeking to appoint a Postdoctoral/ Senior Research Associate to work on feature extraction and biometric development. Hard biometrics, such as fingerprints, are well understood and some soft biometrics are gaining traction within both biometric and forensic domains (e.g. superficial vein pattern, skin crease pattern, morphometry, scars, tattoos and pigmentation pattern). A combinatorial approach of soft and hard biometrics has not previously been attempted from images of the hand. We will pioneer the development of new methods that will release the full extent of variation locked within the visible anatomy of the human hand and reconstruct its discriminatory profile as a retro-engineered multimodal biometric. A significant step change is required in the science to both reliably and repeatably extract and compare anatomical information from large numbers of images especially when the hand is not in a standard position or when either the resolution or lighting in the image is not ideal.

We invite applications from enthusiastic individuals who have a PhD or equivalent experience in a relevant discipline such as Computer Science or Electrical Engineering. You must be able to demonstrate a research background in the area of image processing, computer vision, and/or deep learning. Familiarity with image analysis methods, biometrics and machine learning/deep learning frameworks is not essential but will put you at an advantage. We will also value highly your ability to learn rapidly and to adapt to new technologies beyond your current skills and expertise. For more details, please see the Job Description/Person Specification for this position.

This Postdoctoral/ Senior Research Associate position is being offered on a 2-year fixed-term basis. For further information or an informal discussion please contact Dr Bryan Williams (b.williams6@lancaster.ac.uk), Prof Plamen Angelov (Email: p.angelov@lancaster.ac.uk) or Dr Hossein Rahmani (Email: h.rahmani@lancaster.ac.uk).

The School of Computing and Communications offers a highly inclusive and stimulating environment for career development, and you will be exposed to a range of further opportunities over the course of this post. We are committed to family-friendly and flexible working policies on an individual basis, as well as the Athena SWAN Charter, which recognises and celebrates good employment practice undertaken to address gender equality in higher education and research.

Lancaster University - ensuring equality of opportunity and celebrating diversity

Read the rest here:
Postdoc Research Assoc./Senior Research Assoc. - Image Processing/Computer Vision & Machine Learning job with LANCASTER UNIVERSITY | 192791 -...

Manufacturing 2020: 5G, AI, IoT And Cloud-Based Systems Will Take Over – DesignNews

Technology vendors expect that 2020 will be a big year for manufacturing plants to onboard digital systems. But will it happen? While digital systems IoT, machine learning, 5G, cloud-based systems have proven themselves as worthwhile investments, they may not get deployed widely.

For insight on what to expect in 2020, we turned to Rajeev Gollarahalli, chief business officer at 42Q, a cloud-based MES software division of Sanmina. Gollarahalli sees a manufacturing world that will take solid steps toward digitalization in 2020, but those steps are likely to be incremental rather than revolutionary.

5G On The Plant Floor

Design News: Will 5G increase the pace of digital factory transformation, and where it will have the most impact?

Rajeev Gollarahalli: Weve started to see a little of 5G popping up in the factory, but its limited. Its mostly still in the proof-of-concept stage. It will be some time before we see more, probably around the end of next 2020.

DN: Will 5G increase the pace of digital transformation?

Gollarahalli: Undoubtedly. Yet one limit is that in order to make accurate decisions, you need to be able to ingest high volumes of data in real-time. Thats been one of the limitations in infrastructure. When you can use 5G across the factory, youll have considerable infrastructure. That challenge with data is solved by 5G.

DN: What still needs to be done in order to deploy 5G?

Gollarahalli: You have the 5G service providers and 5G equipment manufacturers working together. Both are developing capabilities in their own silos. What has not yet matured is putting these together, whether its in health, discreet manufacturing, telecom, or aerospace. The use cases havent matured, but we are seeing more use cases piling up.

DN: What could spur equipment vendors and telecom to work together?

Gollarahalli: I think well see an industry consortium. That doesnt exist now. There are partners that are starting to talk. Verizon is working with network providers. Youre going to see two or three different groups emerge and come together to do standards. With the advent of 5G, and the emergence of IIoT, they are all going to come together. One of the limitations is the volume. We generate about a terabyte of data with IoT. The timing will be perfect for getting 5G utilized for IoT and get it widely adopted.

The Emerging Workforce Skilled In Digital Systems

DN: What changes in the plant workforce can we expect in the coming year?

Gollarahalli: The workforce will need a completely different set of skills to drive automation on the factory floor, and industry has to learn how to attract those workers People are saying manufacturing is contracting, but Im not seeing it. Manufacturing seems to be stable. As for skills for the factory of the future, we need to be re-tooling our employees. The employees today dont have the technical skills, but they have the domain skills. We need to get them the technical skills they need.

DN: Will the move to a workforce with greater technology skills be disruptive?

Gollarahalli: Youre not going to see mass layoffs, but youre going to see retooling the skills of the employees. We cant get them trained at the speed that technology is increasing. Were going to see more employees getting ready in trade schools and with degrees. What youre seeing is a convergence of data skills with AI and domain skills. An ideal skillset is someone who understands manufacturing and knows the data. For several years kids were moving away from STEM, wanting to learn the sexier stuff. But I think STEM is coming back.

Cloud-Based Systems For Security

DN: Will cloud-based systems be the go-to for manufacturing security versus on-premises security?

Gollarahalli: Five years ago, when I talked about cloud with customers, they asked whether it was real-time. That was when the infrastructure was not as secure. I have a network at home. That was unheard of 10 years ago in factories. Now that the infrastructure issue has been solved, the next step is security. I have always countered that you cant secure data on premises as well as you can in a cloud. A lot of money has poured into cloud-based security. No single company can match that. Its almost impossible to do it on premises.

AI, Machine Learning and Big Data Analytics

DN: Will advances in AI, machine learning, and analytics?

Gollarahalli: Were seeing AI and ML (machine learning) is some areas. Were seeing it implemented in some areas at 42Q. Most use cases are around asset management and quality. Its used to predict the quality of a product and to take preventive actions in asset maintenance. AI and ML are also popping up in supply chain management. 2020 will be the year of AI and ML. Its getting embedded into medical products. Youll see it pop up everywhere, showing up on the factory floor as well as in our consumer products.

DN: Is AI and machine learning going mainstream yet or is it mostly getting deployed by large manufacturers who are typically the early users?

Gollarahalli: Youre going to see it move down the supply chain to tier 2 and tier 3 suppliers. I dont think its just for the elite any more. Its getting adopted quickly, but it is not happening as quickly as I thought it would.

The Role Of IoT In Manufacturing

DN: Will we see growth in IoTs role in measuring and providing closed loop controls?

Gollarahalli: Were going to see it in manufacturing, regulating the humidity in the room or the temperature on the floor. They need closed loop from IoT. Theyre measuring with IoT, but the closed loop as not been adopted as quickly. We dont have the right standards. How do you do close loop with a system that is throwing off data in milliseconds. You must be able to use the IoT and those algorithms. If you can make them more efficient for closed loop control, youll see a lot more of it going forward.

Rob Spiegel has covered automation and control for 19 years, 17 of them for Design News. Other topics he has covered include supply chain technology, alternative energy, and cyber security. For 10 years, he was owner and publisher of the food magazine Chile Pepper.

January 28-30:North America's largest chip, board, and systems event,DesignCon, returns to Silicon Valleyfor its 25th year!The premier educational conference and technology exhibition, this three-day event brings together the brightest minds across the high-speed communications and semiconductor industries, who are looking to engineer the technology of tomorrow. DesignCon is your rocket to the future. Ready to come aboard?Register to attend!

More:
Manufacturing 2020: 5G, AI, IoT And Cloud-Based Systems Will Take Over - DesignNews

Doctor’s Hospital focused on incorporation of AI and machine learning – EyeWitness News

NASSAU, BAHAMAS Doctors Hospital has depriortized its medical tourism program and is now more keenly focused on incorporating artificial intelligence and machine learning in healthcare services.

Dr Charles Diggiss, Doctors Hospital Health System president, revealed the shift during a press conference to promote the 2020 Bahamas Business Outlook conference at Baha Mar next Thursday.

When you look at whats happening around us globally with the advances in technology its no surprise that the way companies leverage data becomes a game changer if they are able to leverage the data using artificial intelligence or machine learning, Diggiss said.

In healthcare, what makes it tremendously exciting for us is we are able to sensorize all of the devices in the healthcare space, get much more information, use that information to tell us a lot more about what we should be doing and considering in your diagnosis.

He continued: How can we get information real time that would influence the way we manage your conditions, how can we have on the backend the assimilation of this information so that the best outcome occurs in our patient care environment.

Diggiss noted while the BISX-listed healthcare provider is still involved in medical tourism, that no longer is a primary focus.

We still have a business line of medical tourism but one of the things we do know pretty quickly in Doctors Hospital is to deprioritize if its apparent that that is not a successful ay to go, he said.

We have looked more at taking our specialities up a notch and investing in the technology support of the specialities with the leadership of some significant Bahamian specialists abroad, inviting them to come back home.

He added: We have depriortized medical tourism even though we still have a fairly robust programme going on at our Blake Road facility featuring two lines, a stem cell line a fecal microbiotic line.

They are both doing quite well but we are not putting a lot of effort into that right now compared to the aforementioned.

Read more:
Doctor's Hospital focused on incorporation of AI and machine learning - EyeWitness News

The bubbles in VR, cryptocurrency and machine learning are all part of the parallel computing bubble – Boing Boing

Yesterday's column by John Naughton in the Observer revisited Nathan Myhrvold's 1997 prediction that when Moore's Law runs out -- that is, when processors stop doubling in speed every 18 months through an unbroken string of fundamental breakthroughs -- that programmers would have to return to the old disciplines of writing incredibly efficient code whose main consideration was the limits of the computer that runs on it.

I'd encountered this idea several times over the years, whenever it seemed that Moore's Law was petering out, and it reminded me of a prediction I'd made 15 years ago: that as computers ceased to get faster, they would continue to get wider -- that is, that the price of existing processors would continue to drop, even if the speed gains petered out -- and that this would lead programmers towards an instinctual preference for solving the kinds of problems that could be solved in parallel (where the computing could be done on several processors at once, because each phase of the solution was independent of the others) and an instinctual aversion for problems that had to be solved in serial (where each phase of the solution too the output of the previous phase as its input, meaning all the steps had to be solved in order).

That's because making existing processors more cheaply only requires minor, incremental improvements in manufacturing techniques, while designing new processors that are significantly faster requires major breakthroughs in material science, chip design, etc. These breakthroughs aren't just unpredictable in terms of when they'll arrive, they're also unpredictable in terms of how they will play out. One widespread technique deployed to speed up processors is "branch prediction," wherein processors attempt to predict which instruction will follow the one it's currently executing and begin executing that without waiting for the program to tell it to do so. This gave rise to a seemingly unstoppable cascade of ghastly security defects that the major chip vendors are still struggling with.

So if you write a program that's just a little too slow for practical use, you can't just count on waiting a couple of months for a faster processor to come along.

But cheap processors continue to get cheaper. If you have a parallel problem that needs a cluster that's a little outside your budget, you don't need to rewrite your code -- you can just stick it on the shelf for a little while and the industry will catch up with you.

Reading Naughton's column made me realize that we were living through a parallel computation bubble. The period in which Moore's Law had declined also overlapped with the period in which computing came to be dominated by a handful of applications that are famously parallel -- applications that have seemed overhyped even by the standards of the tech industry: VR, cryptocurrency mining, and machine learning.

Now, all of these have other reasons to be frothy: machine learning is the ideal tool for empiricism-washing, through which unfair policies are presented as "evidence-based"; cryptocurrencies are just the thing if you're a grifty oligarch looking to launder your money; and VR is a new frontier for the moribund, hyper-concentrated entertainment industry to conquer.

It's possible that this is all a coincidence, but it really does feel like we're living in a world spawned by a Sand Hill Road VC in 2005 who wrote "What should we invest in to take advantage of improvements in parallel computing?" on top of a white-board.

That's as far as I got. Now what I'm interested in is what would a contrafactual look like? Say (for the purposes of the thought experiment) that processors had continued to gain in speed, but not in parallelization -- that, say, a $1000 CPU doubled in power every 18 months, but that there weren't production lines running off $100 processors in bulk that were 10% as fast.

What computing applications might we have today?

(Image: Xiangfu, CC BY-SA)

Amazon has reinstated FedEx as a ground delivery carrier for Prime members shipments. The online retailer said today the shipper consistently met its delivery requirements, after suspending it last month.

Comments filed with the FCC by AT&T, Frontier, Windstream and Ustelcom (an industry group representing telcoms companies) have asked the FCC to change the rules for its next, $20.4 billion/10 year rural broadband subsidy fund to allow them to offer slower service than the (already low) speeds the FCC has proposed.

If you are trying to find work in South Korea, you are likely to be interviewed by a bot that uses AI to scan your facial expressions to determine whether or not you are right for the job.

If you love wine and we mean, really love wine its a personal thing. You know what foods your favorite wine likes to mingle with and the ones they dont. You have a favorite time to drink. Youve read a thing or two about its history, maybe visited where it was made. Its []

If youre working with databases, youre working with SQL. Even in the changing world of the web, there are some classics that endure, and SQL (along with its database management system MySQL) is one of them. Millions of websites and databases have been built using SQL code as their foundation, and theyre still being built []

Do you know Python? If youre interested in any aspect of web development, data analytics or the Internet of Things, you should. Python is the computer language used to drive everything from that voice recognition software on your phone to the gaming apps you use to kill time. So yes, theres a market for those []

Visit link:
The bubbles in VR, cryptocurrency and machine learning are all part of the parallel computing bubble - Boing Boing

The German Constitutional Court Will Revisit the Question of Mass Surveillance, Will the U.S.? – EFF

On January 14 and 15, 2020, the German Federal Constitutional Court will be holding a hearing to reevaluate the Bundesnachrichtendienst (BND) Act, which gives the BND agency (similar to the National Security Agency in the United States) broad surveillance authority. The hearing comes after a coalition of media and activist organizations including the Gesellschaft fr Freiheistrechte filed a constitutional complaint against the BND for its drag net collection and storage of telecommunications data. This new hearing continues a renewed effort on the part of countries around the world to re-access the high cost of liberty that comes with operating an invasive drag net surveillance program and may increase global pressure on the United States intelligence community.

One of the coalitions leading arguments against massive data collection by the foreign intelligence service is the fear that sensitive communications between sources and journalists may be swept up and made accessible by the government. Surveillance which, purposefully or inadvertently, sweeps up the messages of journalists jeopardizes the integrity and health of a free and functioning press and could chill the willingness of sources or whistleblowers to expose corruption or wrongdoing in the country.

In September 2019, based on similar concerns about the surveillance of journalists, South Africas High Court issued a watershed ruling that the countrys laws do not authorize bulk surveillance. In part, because there were no special protections to ensure that the communications of lawyers and journalists were not also swept up and stored by the government.

In EFFs own landmark case against the NSAs dragnet surveillance program, Jewel v. NSA, the Reporters Committee for Freedom of the Press recently filed an Amicus brief making similar arguments about surveillance in the United States. When the threat of surveillance reaches these sources, the brief argues, there is a real chilling effect on quality reporting and the flow of information to the public.

This new complaint comes years after the revelations of global surveillance coalitions exposed by Edward Snowden, and only two years after a report revealed that BND had surveyed at least 50 phone numbers, fax numbers, and email addresses of known foreign journalists starting in 1999.

In 2016, Germanys Bundestag passed intelligence reform that many argued did not go far enough. Under the post-2016 order, an independent panel oversees the BND and any foreign intelligence collected from international communications networks must be authorized by the chancellor. However, the new reform explicitly allowed surveillance to be conducted on EU states and institutions for the purpose of foreign policy and security, and permitted the BND to collaborate with the NSAboth of which allow for the privacy of foreign individuals to be invaded.

It is worth noting that part of what allows a case like this to move forward is the ability of German citizens to know more about the surveillance programs their nation operates. In the United States, our lawsuit against NSA mass surveillance is being held up by the government argument that it cannot submit into evidence any of the requisite documents necessary to adjudicate the case. In Germany, both the BND Act and its sibling, the G10 Act, as well as their technological underpinnings, are both openly discussed making it easier to confront their legality.

We eagerly await the outcome of the German hearing and hope that the BND will be another fallen domino in the movement to restore global privacy. Meanwhile, EFF will continue to litigate our constitutional challenge to the U.S. governments mass surveillance of telephone and internet communications and will complete briefing in the Ninth circuit in late January 2020.

See the original post here:
The German Constitutional Court Will Revisit the Question of Mass Surveillance, Will the U.S.? - EFF

In next war, soldiers will leave their smartphones at home: Peter Apps – Reuters

LONDON (Reuters) - As the 1st Brigade Combat Team of the U.S. 82nd Airborne Division departed for the Middle East amid rising tensions with Iran, their divisional commander gave a simple order. All personnel entering the region were told to leave smartphones and personal devices in the United States.

It was a clear sign of growing official nervousness over the potential vulnerability of items that had become an unquestioned fact of life for soldiers and civilians alike, but which Washington fears potential foes could track, exploit and use for targeting. Such concerns are far from new, but were regarded less seriously when Americas primary enemies were seen as non-state groups such as Islamic State, the Taliban and al Qaeda. Now Washington is worried about other nations not just Iran, but Russia and China which are seen as a much more existential threat.

It also points to a much greater trend. Across the board, the communications revolution and the vast sea of data it produces has made surveillance much easier, a trend likely to be magnified by the growth of artificial intelligence. It has also facilitated the mass leaking of phenomenal amounts of information, as demonstrated by NSA contractor Edward Snowden. And simultaneously, it has overturned decades of tradecraft in espionage and associated fields, where despite the rise in fake news and online trickery, spy agencies like the CIA now reportedly find it almost impossible to maintain the multiple false identities on which they once relied.

The foundations of the business of espionage have been shattered, former CIA official Duyane Norman said in a Yahoo news report, which outlined how foreign governments have become much better at tracking real and covert U.S. identities through phone and bank records, facial recognition and even the records of off-the-shelf DNA tests. The debate [within the intelligence community] is like the one surrounding climate change. Anyone who says otherwise just isnt looking at the facts.

For military commanders, the options are also becoming limited. In Russias war with Ukraine, Moscows forces have shown remarkable skill in targeting counterparts on the battlefield as soon as they use their phones or radios. According to the U.S.-based Military Times, the U.S. Marine Corps already bans troops from taking personal devices on Middle East combat deployments. The U.S. Navy says it is reconsidering its rules, while the Army says such decisions - as with the 82nd Airborne - are at the personal discretion of commanders.

Decisions are inevitably compromises. Taking away devices reduces the ability of personnel not just to talk to their families, but can complicate communications and organization. But concerns are growing fast. This month, the Pentagon also demanded personnel stop using the Chinese-owned TikTok application, with other similar platforms including WhatsApp also added to some blacklists.

Reducing careless talk and unnecessary radio and other emissions is hardly new. As far back as World War One, British commanders discovered telephone systems in forward trenches had often been compromised by German signallers and did everything they could to ensure the most sensitive messages were instead carried by hand or word-of-mouth. Naval vessels, military aircraft and particularly submarines have long done everything possible to mask their signatures, particularly near enemy territory. Recent years, however, have seen growing lapses, including from those who might have been expected to know better.

In early 2018, data released by fitness app Strava identified assorted U.S., Russian and even Iranian secret bases in Syria where military personnel and contractors appeared to have recorded their exercise runs without realizing they would be highlighted and widely shared. The U.S. military has now gone so far as to incorporate such mistakes into training exercises, killing off an entire unit in one drill after a soldier posted a selfie photo whose geo-tagging gave away their position.

Authorities are also nervous about non-accidental release of information. This November, White House and military staff removed smartphones from reporters and presidential aides for the duration of President Donald Trumps unannounced Thanksgiving trip to Afghanistan, which appeared as much about ensuring the news did not leak as worries the phones themselves might be tracked.

In terms of the latter, the greatest threat will come when artificial intelligence and voice recognition software reach the point where phones can be used to monitor nearby conversations without use of a human analyst or translator. That may come sooner rather than later one reason why some security experts are extremely nervous about Chinese firm Huawei being at the heart of 5G phone networks in several European countries. That may include Britain, due to make its own choice soon. This week, the head of Britains Security Service told the Financial Times he believed that risk can be managed without barring the Chinese firm altogether. U.S. counterparts, however, are much more cautious.

For authoritarian states like China and Iran, both witnessing a major spike in often smartphone-coordinated protest and unrest, being able to access and track electronic devices and the population at large is seen as a priority. Most notably in Xinjiang province but also across the country, Beijing is turning China into the most sophisticated surveillance state in human history. Within its borders, China already has considerable, sometimes almost exhaustive, access to data and devices. Faster and more incisive artificial intelligence and machine learning will dramatically extend that reach.

The question for Western states will be how effectively their potential foes can repurpose that technology to gather information outside their borders. The United States and its allies have become used to being able to use whatever devices and communications they wished since the Berlin wall fell. Those days are ending fast.

*** Peter Apps is a writer on international affairs, localization, conflict and other issues. He is the founder and executive director of the Project for Study of the 21st Century; PS21, a non-national, non-partisan, non-ideological think tank. Paralysed by a war-zone car crash in 2006, he also blogs about his disability and other topics. Hewas previously areporter for Reuters and continues to be paid by ThomsonReuters. Since 2016, he has been a member of the British Army Reserve and the UK Labour Party, and is an active fundraiser for the party.

(The opinions expressed here are those of the author, a columnist for Reuters)

Originally posted here:
In next war, soldiers will leave their smartphones at home: Peter Apps - Reuters

Australia’s Pine Gap spy base likely involved in the assassination of Qassem Suleimani – World Socialist Web Site

Australias Pine Gap spy base likely involved in the assassination of Qassem Suleimani By Patrick OConnor 14 January 2020

In the aftermath of the illegal assassination of Iranian General Qassem Suleimani on January 2, no-one within the Australian media and political establishment has raised the question as to whether the Pine Gap spy base in central Australia played a role in the killing.

If it did so, senior Australian government officials are implicated in war crimes. The failure of the press and the opposition Labor Party to demand an explanation from the government of Prime Minister Scott Morrison is another demonstration of the ruling elite closing ranks behind US imperialism. The Morrison government, with the tacit backing of Labor leader Anthony Albanese, has responded to Washingtons drive for war against Iran by doubling down on its support for US imperialism in the Middle East and internationally (see Australian government backs US provocations against Iran).

The Pine Gap facility began operations in 1970, when it was falsely billed as a space research centre. In reality it functioned as a major signals intelligence gathering facility for the US, primarily directed against the Soviet Union. Since the end of the Cold War, Pine Gaps role has expanded further, with additional infrastructure built at the desert site and hundreds of extra staff hired. According to intelligence expert Professor Des Ball of the Australian National University, Pine Gap has been used to intercept long-distance phone calls, satellite transmissions, anti-missile signals, and ballistic missile electronic communications.

In addition to this, American National Security Agency (NSA) whistleblower Edward Snowden revealed in documents published in 2017 that Pine Gap has, over the last two decades, played a critical role in assisting US military operations, including identifying targets for missile attacks and drone assassinations.

An August 2012 NSA site profile of Pine Gap stated that it has a special section, known as the geopit, equipped with a number of tools available for performing geolocations. The document, which used the US intelligence codename RAINFALL for the Pine Gap facility, explained: RAINFALL detects, collects, records, processes, analyses and reports on PROFORMA signals collected from tasked entities, it stated. PROFORMA signals are communications data of radar and weapons systems, such as surface-to-surface missiles, anti-aircraft artillery and fighter aircraft.

This revelation followed the publication of other documents courageously leaked by Snowden in 2013 that showed that Pine Gap played a central role within a NSA program codenamed X-XKeyscore, that collects electronic data on people around the world, permanently storing phone numbers, email addresses, log-ins and user activity. As part of the Five Eyes global intelligence networkled by the US and including Australia, Britain, Canada, and New ZealandAustralian intelligence agencies have high-level access to the NSA data, including on Australian citizens.

The Snowden revelations confirmed previous media reports of Pine Gaps role in US drone assassination operations.

In July 2013, journalist Phillip Dorling wrote an article for the Age and Sydney Morning Herald, based on unnamed sources, including former Pine Gap personnel. He explained that Pine Gap allowed the US military to process intercepted electronic communications and provide target information to the US military within minutes.

Dorling reported that the Pentagon was critically dependent on Pine Gap for locating targets marked for extrajudicial execution by President Barack Obama. The facility provides information that feeds into the United States drone strike program and other military operations, with personnel sitting in airconditioned offices in central Australia directly linked, on a minute-by-minute basis, to US and allied military operations in Afghanistan and, indeed, anywhere else across the eastern hemisphere.

Given this record, it would be unusual if Pine Gap intelligence played no role at all in the US assassination of General Qassem Suleimani, leader of the Quds Force of the Islamic Revolutionary Guard Corps.

Details about the hit operation continue to emerge. According to the New York Times, a US MQ-9 Reaper drone fired two missiles at a convoy of vehicles that was departing Baghdad airport, near an air cargo terminal. The bombing killed Suleimani, as well as Abu Mahdi al-Muhandis, of the Iraqi government-backed Popular Mobilisation Forces, and at least three other people. Iran responded by last Wednesday launching limited missile operations against two US military bases in Iraq, in Erbil and Ain al-Assad airbase in Anbar province.

The ratcheting up of tensions has paved the way for the Trump administration to prepare a devastating war of aggression against Iran, threatening a far wider conflagration engulfing the primary targets of US imperialism, Russia and China (see Trump bides his time, but the preparations for war against Iran will continue).

The Australian government is complicit in the drive to war. Canberra has been directly involved in every US provocation in the Middle East in recent decades, including the illegal invasion and occupation of Iraq from 2003. Now the government, again without challenge from within the political establishment, is preparing to line up with an even greater war crime, the US-led regime change offensive against Iran.

The assassination of Suleimani underscores the urgent need for the development of an internationally unified antiwar movement. In Australia, among the primary demands of such a movement will be the immediate and unconditional end to the US-Australia military alliance and the closure of all US-connected military and intelligence bases, including Pine Gap.

The author recommends:

Australian spy base critical to Obamas drone assassinations[22 July 2013]

Snowden confirms Australian agencies involved in NSA global spying[10 July 2013]

2019 has been a year of mass social upheaval. We need you to help the WSWS and ICFI make 2020 the year of international socialist revival. We must expand our work and our influence in the international working class. If you agree, donate today. Thank you.

See the original post:
Australia's Pine Gap spy base likely involved in the assassination of Qassem Suleimani - World Socialist Web Site

The Treachery, the Idiocy | Letters to the Editor – The Chief-Leader

To the Editor:In 1961 Philip Roth wrote about the difficulty a writer has trying to understand and then describe, and then make credible much of the American reality. It stupefies, it sickens, it infuriates, and finally, it is even a kind of embarrassment to ones own meager imaginationThe daily newspapersfill me with wonder and awethe fixes, the scandals, the insanities, the treacheries, the idiocies, the lies, the pieties, the noise

That was then. What about now?

President Trump was impeached in December by the House of Representatives. Every Republican in the House opposed the two articles of impeachment. Senate Majority Leader Mitch McConnell said he was not an impartial juror, and would closely coordinate any Senate trial with the White House.

Speaker Nancy Pelosi as late as September rejected impeachment. It was just not worth it. She changed her mind only after a CIA whistleblowers complaint became public, and then proceeded to narrow the impeachment investigation to the Ukraine scandal.

This ignored the Mueller Report, which found 10 possible obstructions of justice by Trump, in its investigation of Russian interference in the 2016 election.

The Speakers strategy follows the advice of Lawrence Welk who said, You have to play what the people understand. Isnt it a pity that Pelosi believes the American people are not capable of understanding that Trumps pattern of behavior for three years makes him, in the words of Laurence Tribe, a serial abuser of power and someone who has committed many impeachable acts?

It was a mistake that the Democrats didnt make the broadest case for impeachment, especially in the wake of the assassination of Qassim Suleimani, and the possibility of war with Iran. Our Commander in Chief was described by John Kelly as an idiot, who said it was pointless to try to convince him of anything. Eliot Cohen concluded that any level-headed observer could see Trumps deficiencies, outlook and experience made him unfit for office.

The president has made well over 13,000 false or misleading claims. He has publicly asked not only the Ukraine, but also Russia and China to provide incriminating evidence on his political opponent.

Twenty women have accused him of rape, sexual assault or sexual harassment.

Trump has granted clemency to Edward Gallagher, a Navy Seal, and two other soldiers who were accused or convicted of war crimes. He makes decisions based on information learned each day from Fox News, and recently took credit for the opening of an Apple factory in Texas that had opened in 2013.

During the impeachment hearings, The New York Times published drawings by one of the terrorists behind the 9/11 attacks, showing how he had been tortured by the CIA. There was also a report in The Washington Post which documented that high-level officials in the Bush, Obama, and Trump administrations repeatedly lied about progress in the 18-year war in Afghanistan and hid evidence that the war was unwinnable. In 1971, The Pentagon Papers similarly revealed that every President from Truman to Johnson (Nixon continued this tradition) had lied to the American people about the Vietnam War.

Speaker Pelosi, in justifying the impeachment of Trump because of the Ukraine scandal, said Our democracy is what is at stake. His actions are in defiance of the vision of our Founders, and the oath of office that he takes to preserve, protect, and defend the Constitution of the United States.

If democracy is at stake when Trump violates his oath of office, why wasnt it at stake for Democrats and Republicans in Congress when the Bush Administration lied about WMDs in Iraq, committed war crimes after 9/11 when the CIA carried out torture and renditions to black sites of suspected terrorists, and authorized illegal warrantless wiretaps? Speaker Pelosi recently admitted she was under pressure to begin impeachment proceedings against Bush for invading Iraq. However, she rejected this pressure, saying, I just didnt want it to be a way of life in our country.

Why wasnt democracy also at stake when the Obama Administration decided not to hold the Bush administration and the CIA accountable for its abuses of power in the war against terror and the war in Iraq, and when it failed to hold anyone accountable for the National Security Administration abuses revealed by Edward Snowden, who was immediately charged with violating the Espionage Act?

Who can make sense of all of this in a country that Philip Roth, decades ago described as an unreal environment, a distressing cultural and political predicament and the indigenous American berserk?

We depend on the support of readers like you to help keep our publication strong and independent.Join us.

Follow this link:
The Treachery, the Idiocy | Letters to the Editor - The Chief-Leader

This Is What an Iranian Cyberattack On The US Would Look Like – Newsweek

Shortly after Iran lobbed two-dozen missiles into two U.S. military bases in Iraq last week, the country's foreign minister tweeted that Iran had "concluded" its "proportionate" response to the assassination of Major General Qassem Soleimani.

Few people in the U.S. military are taking this statement at face value. Iran is likely to step up its harassment of the U.S. using its network of proxy groups in the Middle East and elsewhere. If history is any guide, that response will include cyber attacks against the U.S. government, companies and high-profile individualsand possibly even the 2020 elections.

"I don't think Iran is finished," says Jon Bateman, a former Iran expert at the U.S. Defense Intelligence Agency and now a fellow at the Carnegie Endowment for International Peace. The door is open, he says, to "follow-on actions that are more covert or more plausibly deniable. Cyber classically is one of the tools."

Although Iran isn't considered to be one of the world's most formidable cyber threatsits program lags behind Russia's and China'sthe nation is still capable of causing a great deal of disruption. Its past cyber attacks have been characterized by unpredictability, and it's unclear how much its capabilities have improved in recent years.

It's been a decade since Iran weathered a sophisticated cyber-attack that set its nuclear weapons program back on its heels. The U.S. and Israel are widely thought to have launched an astonishingly intelligent bit of malware called Stuxnet, which was small enough to fit on a thumb drive but smart enough to wend its way like a heat-seeking missile through the internet to penetrate Tehran's heavily-fortified nuclear program. Not only did Stuxnet destroy uranium centrifuges, used to make bomb-grade uranium, it disguised itself by creating a false appearance of normalcy to the engineers who monitored the equipmentuntil it was too late. "Iran... has demonstrated a clear ability to learn from the capabilities and actions of others," said an NSA report released by Edward Snowden and reported in 2013 by The Intercept.

Heightened tensions in the aftermath of the Suleimani killing have U.S. cyber experts worried about Iran-backed cyber attacks in the months to come.

The big worries

The most worrying cyber threat from Iran are those that could result in a loss of life. In this respect, Iran is capable of using hackers to support some kind of conventional military action, such as a bombing or the assassination of an individual or a kidnapping. It could also use cyber espionage or data collection techniques to monitor the movement of troops, ships or planes in the Middle east and target them for attack.

To conduct a targeted assassination, Iran would need to bring together a variety of streams of intelligence. Infecting mobile phones with malware would give it access to a cornucopia of informationincluding potentially the real-time whereabouts of targets. A phone hack could provide what experts call "pattern of life" informationwhere an individual tends to go, and whenthat could be used to predict a target's whereabouts. By gaining access to phone calls, emails, text message and contact lists, hackers could even manipulate a target to walk unwittingly into a trap. "Iran has conducted many targeted killings abroad through its proxies and, perhaps, directly," says Bateman. "In 2020 that would include a cyber element. Any state would use that."

Installing malware on a mobile devices is not as hard as you might think. The simplest method is through "social engineering"tricking targets into divulging compromising information such as passwords or, as Russian operatives did with Clinton campaign chairman John Podesta in 2016, installing malware. In recent years, popular messaging apps WhatsApp and iMessage have had "no-click" vulnerabilitiessoftware bugs allow hackers to implant malware simply by sending a message, without requiring any action on the part of the target. Although these particular no-click vulnerabilities have since been patched, there could be others. Iran is not known to have exploited these vulnerabilities in the past, but that doesn't mean they wouldn't in the future.

Disinformation campaigns

Another worry is that Iran could generate disinformation for the purposes of inspiring violence. In recent months, Iran-backed groups have used social media to share false data about the U.S. militaryone widely-circulated claim was that U.S. Marines had arrested an Iraqi Parliamentarian, says Bateman. "Actions that kind of foment anger and distrust of U.S. forces and incite violence against them would be concerning," he says.

Although Iran doesn't have the kind of massive misinformation apparatus in place to sow division, the way Russia did in the run-up to 2016, it's conceivable that Iran could seek to influence the 2020 election, if it wanted to, by other means. Iran has good cyber-attack chops in breaking and entering computer systems. These skills could be useful for finding and leaking sensitive informationsimilar to Russia's hack of the Democratic National Committee in 2016. Security experts suspect that Iran was behind the 2015 attack on the Saudi Ministry of Foreign Affairs, which uncovered confidential diplomatic cables that were subsequently leaked, according to Bateman.

Iran was already caught once trying to hack the Trump campaign. In October, Microsoft reported that a hacker group called Phosphorous, which it believes is linked to the Iranian government, made more than 2700 attempts to identify email accounts and attacked 241 of them, including some associated with a U.S. political campaign. The Wall Street Journal later reported that the campaign under attack was Trump's. The hackers had succeeded in breaking into four accounts, none directly linked to the campaign, before Microsoft shut it down. "This effort suggests Phosphorus is highly motivated and willing to invest significant time and resources engaging in research and other means of information gathering," Microsoft said in its October statement.

Iran could also pose a plausible threat to voting machines. Although the U.S. election system is fragmented, Iran could try to compromise voting infrastructure in key districts, spreading fear, uncertainty and doubt. Undermining Americans' faith in the legitimacy of the election could be even more destabilizing than tampering with the actual vote results.

Experts say that such a tactic would be out of character for Iran, which in the past hasn't shown much interest in the U.S. political election system. From Iran's point of view, there isn't much difference between the policies of the two U.S. parties. "Iran sees a consistent four-decade-long pressure campaign that has bipartisan approval," says Bateman. "But the killing of Soleimani is more personal than previous U.S. actions because of the relationship he had with the Supreme Leader [Ayotallah Ali Khamenei], so I wouldn't rule out something that sought to embarrass or harm Donald Trump personally."

Soft corporate targets

Disrupting corporations is both in character for Iran and well within its current cyber capabilities. Although Iran wouldn't be able to make much headway with tech giants like Apple, Google, Facebook, Amazon and Microsoft, myriad other organizations are vulnerable to hacking, including many banks, chemical plants, oil refineries, pharmaceutical companies, water treatment plans and the electrical grid. It's likely that Iran has been installing malware in such organizations over the past decade, to lie dormant for many years until the right moment. "It's called 'preparing the battlefield'," says Steven Bellovin, a computer-science professor at Columbia University in New York who consults for defense organizations. "You wait, like sleeper cells, until you have three or four chemical plants and a couple of power plants, and then you act."

The malware would presumably activate on a signal from Iran and then proceed to carry out a coordinated cyber attack. This could take many forms. In a power plant, malware could cause turbines to spin so erratically that they eventually broke down--which is exactly how Stuxnet took out the uranium centrifuges--shutting down portions of the grid. In a pharmaceutical company, malware could change dosages in pills coming off a factory line, sowing panic.

It's unlikely that Iran has the capacity for waging a cyber war that results in significant loss of life, experts say. For instance, although it could use malware to damage power plants, it would not likely be able to cause damage on enough of a scale to create a prolonged outage of the U.S. electrical grid. "A real cyber war would destroy critical infrastructure, killing potentially millions of people," says Scott Borg, director of the U.S. Cyber Consequences Unit, a non-profit research group specializing in cyber security. "If we're totally talking about real cyber war, Iran has no capability."

The Stuxnet malware is also not likely to be replicated by Iran's engineers. That weapon required more than just expert programming: it required a massive amount of intelligence gathering to figure out how to launch the virus to the exact computer chips the Iranian nuclear engineers had built into their uranium centrifuges. Iran simply doesn't have the expertise or the resources to develop malware on such a scale, experts believe. "Cyber weapons, or malware, aren't as simple as just picking a gun off the street that someone has dropped and then loading it and firing it yourself," says Bateman. "A cyber operation is a complex sequence of events, in which you need to understand, and penetrate, a specific target and work your way up to a specific effect you'd like to achieve."

Learning curve

One factor working against Iran's cyber capabilities, says Borg, is distrust of the government. Although Iran possesses considerable talent in the realm of computing, most capable hackers in Iran and its diaspora don't see eye-to-eye with the Ayatollah, and therefore they withhold cooperation. "The Iran hacker groups are more moderate politically," he says. "It's hard to acquire technological expertise without becoming a little cosmopolitan and moderate."

"But if you could offend them enough to get them to rally around their leaders," he says, "Iran could become a formidable cyber power in a short timea matter of months."

See more here:
This Is What an Iranian Cyberattack On The US Would Look Like - Newsweek