SUTD to offer new undergrad degree in design and artificial intelligence – The Straits Times

SINGAPORE - Artificial intelligence (AI) technologies can benefit designers, if they know how to harness them.

Statistical data can be used to predict an outcome a method known as predictive modelling. In urban planning for example, demand for public trains can be forecasted in order to create more efficient public transport deployment plans.

To equip students with such skills, the Singapore University of Technology and Design (SUTD) has launched a new undergraduate degree in design and AI,in anticipation of a growing demand for talents who can combine expertise in design innovation with AI technology.

The 3 -year programme - the first of its kind in Singapore - will take in students this academic year, which starts in May, SUTD said on Friday (Jan 10).

Students will be exposed to areas of design such as user interface/user experience (UI/UX), product, systems, built environment, and data-driven design.

They will also learn to use AI technologies and algorithms to produce better design and applications.

Graduates ofthis programme will be able to work as data scientists and data visualisation specialistsin industries such as urban planning, product design and telecommunications, the university said.

Established in 2009, SUTD is the fourth autonomous university in Singapore and focuses on engineering, innovation and design.

It said that the entry requirements for the new programme are the same as for its other four degrees: architecture and sustainable design; engineering product development; engineering systems and design; and information systems technology and design.

Generally, students should be competent in mathematics and the sciences, namely physics or chemistry.

Statistics provided by the university show that of the A Level students who were offered places in the university admission exercise last year, nearly all had taken mathematics at the H2 level, and eight in 10 scored at least a B.

Nearly all had also taken either physics or chemistry, or both, at the H2 Level, and nearly seven in 10 scored at least a B for either or both subjects.

SUTD president Chong Tow Chong said: "The recent announcements from Deputy Prime Minister Heng Swee Keat on the next steps in Singapore's Smart Nation journey underscorethe importance of artificial intelligence and the role it will play in bringing about social and economic benefits.

"The main goal of the design and AI programme is to equip students with the ability to create human-centred design using data analysis and machine learning, which is AI-driven," added Professor Chong.

Jurong Pioneer Junior College graduate Michael Hoon, who read H2 maths, further maths and physics, and also took a H3 physics module offered by Nanyang Technological University, is interested in the new programme.

Said the 18-year-old: "I've always been interested in maths and science since I was young, for the most part, due to exposure from school teachers and researching a lot of information online.

"Both subjects are visibly all around us and pretty much serveas the foundations of our survival and development, and being able to apply and integrate the theoretical modelling we have learnt into our daily livesis pretty interesting too."

Here is the original post:
SUTD to offer new undergrad degree in design and artificial intelligence - The Straits Times

Should Artificial Intelligence in Cars Be Programmed to Be Racism-Free? – Science Times

(Photo : silvawpius.wordpress.com)What are the causes of racial discrimination in artificial intelligence in cars? How does it happen and can it be avoided at all. Does AI really abstract or it is just a set of algorithms too.

When the first singularity called the "big bang" seeded the proto-universe with light and matter that was the first proto-matter into the universe today. What made the universe into what is it now, is the mysterious substance called "Dark matter". In the first few seconds of the big bang, it was so hot, when it cooled down dark matter settled. Gravity and the fundamental forces of the universe pulled all dark matter from heated halos that became everything in the universe.

Now, this dark matter is captured as visual imaged or as background radiation in the galaxy, we know today. Dark matter holds everything in the cosmos together, without it, there is no telling what can happen. Here are insights into what kinds of dark matter that the big bang cooked up, basically everything in the universe floats in a sea of endless dark matter. Kinds of dark matter as defined are warm, cold, and fuzzy, the reason is the scientist give these terms is to make them understandable. Most of the time, everyone gets lost in the play of concepts and terms. Let us begin now.

Factoid#1

Specialists from MIT, Princeton University, and Cambridge University have speculated that the proto-galaxies to later galaxies are not the same. This is because of whether it was a warm, cold, or fuzzy matter when they were formed. A simulation was designed to test the theory on dark matter formations.

Factoid#2

Most dark matter iscoldand does not mix with other matters.Warmis lighter and moves fast, not slow, a bit faster than cold DM. A new concept isfuzzydark matter which is ultralight bits and particles that heavier than an electron. Fuzzy dark matter is essentially heavier, and larger too.

Factoid#3

Most dark matter used to form halos around proto-galaxies yet to form were cold. If it was the fuzzy or warm kind, then galaxies will have trailing tails. Fuzzy universes might look striated, like harp strings.

Factoid#4

Light traveling in the cosmos can be very old, using a telescope that will tell if the dark matter is cold, warm, or fuzzy too. These three kinds of dark matter (DM) is about 85% in the universe today.

Factoid#5

Proving what dark matter is harder to do, and most guesses point at dark matter are cold mostly. And, this is what makes the superstructure of the universe and keeps it together like crazy glue,

Factoid#6

Fuzzy dark matter is totally different, and it acts like a wave throughout the universe. This wave-like dark matter is like to mix with other bits of matter, compared to cold dark matter. Galaxies formed from it will be significantly different from what it is now.

Factoid#7

The scientist is developinga new universal modelof what a fuzzy matter universe will be like. Using the James Webb Space Telescope, they will look back in time and see the first proto-galaxies as they were. Hopefully models by Mocz, Fialkov, Vogelsberger will be proven by then.

Related Article: Is Dark Matter Warm, Cold, or 'Fuzzy'? New Simulations Provide Intriguing Insights.

The rest is here:
Should Artificial Intelligence in Cars Be Programmed to Be Racism-Free? - Science Times

Stefanini Participates in the 2020 Davos World Economic Forum and Brings Its Experience in Artificial Intelligence – MarTech Series

Marco Stefanini, Global CEO Global and founder of the Brazilian multinational, will be present in the annual event and will have an article of his in the INSEAD Global Talent Competitiveness Index Report

In the year in which it reaches its 50th anniversary, the World Economic Forum, a big annual event that reunites the main leaderships and authorities of the planet in the political and economic scenes will count on Stefaninis participation, one of the most important providers in global business solutions based on digital technologies. The event will take place from the 21st to the 24th of January 2020 in Davos in the Swiss Alps. Marco Stefanini, Global CEO and founder of the Brazilian multinational, will be present along with Felipe Monteiro, Strategy professor at INSEAD and Director of The Global Talent Competitiveness Index (GTCI).

Marketing Technology News: TiVo Unveils TiVo Stream 4K

During the annual event, which will have as a central theme Stakeholders for a more cohesive and sustainable world, the INSEAD 2020 GTCI Report will be launched on January 22nd at the Sustainable Development Goals (SDG) Tent. The report will showcase an article titled Latin America: The next source of talent in AI? written by Marco Stefanini in partnership with Fbio Caversan, Artificial Intelligence Research & Development Director of Stefanini USA.

On Chapter 2 of the important global report, the Brazilian multinational evaluates the scope of the Science of Artificial Intelligence and technology in Latin America. Additionally, it highlights Marco Stefaninis vision for the current and future scenarios of this theme, which has been the keynote of the disseminated digital transformation.

Marketing Technology News: IRI and Influential Team Up for First-to-Market Launch of Social Campaign Conversion Feed

For several years, Stefanini has been maintaining a solid partnership with INSEAD, one of the worlds largest and most prestigious business schools and will promote in 2020 the 3rd class in the Leadership Transformation Program, which will take place from March 28th to April 4th on INSEADs Fontainebleau campus in France. The Leadership Transformation proposes a journey of discoveries and knowledge so that high leaderships can surpass limits through collaboration and innovation amongst each other.

Marketing Technology News: TiVo Adds New Content Partners to Expand Its Video Network TiVo+

Follow this link:
Stefanini Participates in the 2020 Davos World Economic Forum and Brings Its Experience in Artificial Intelligence - MarTech Series

Delta Air Develops A.I. Tool to Address Weather Disruptions – ETF Trends

Disruption is widespread in almost any sector as technology like artificial intelligence (AI) is making its way into core businesses to improve processes, including airline operations. In akeynote speechat the annual Consumer Electronics Show, Delta Air Lines CEO Ed Bastian used the forum to discuss the operational structure for Delta, which will be driven by an AI machine learning tool.

Per an Avionics International report, Bastian did not provide a specific product name for the technology, but instead called it a proprietary tool that will mainly be focused on helping passengers and flight crews overcome weather occurrences that impact the routes they fly on a daily basis. The keynote speech is a familiar strategy across all of the divisions of Delta, including their maintenance team whose predictive maintenance leadership gave a speech on how the airline is shifting towards the adoption of AI at the 2019AEEC/AMC annual conference.

Broadly speaking, the AI tool will help improve airline operations in the midst of extreme weather conditions.

Weve cancelled cancellations, but we still have to deal with weather variables like hurricanes or a nasty Noreaster, and thats why the team in our operations and customer center is developing the industrys first machine learning platform to help ensure a smooth operation even in extreme conditions. The system uses operational data to run scenarios and project future outcomes while simulating all the variables of running a global airline with more than 1,000 planes in the sky, Bastian said.

Airline industry innovation can also benefit the US Global Jets ETF (NYSEArca: JETS). JETS seeks to track the performance of the U.S. Global Jets Index, which is composed of the exchange-listed common stock or depository receipts) of U.S. and international passenger airlines, aircraft manufacturers, airports, and terminal services copanies across the globe.

U.S. airlines are headed for a 10thstraight year of profits, which is causing employees to demand higher wages as well as increased benefits. This decade of profitability could put airlines-focused and transportation ETFs in play.

Next year, major U.S. carriers will be negotiating labor agreements with more than 120,000 unionized employees, a process that is set to add to their expenses, aCNBC article noted. American will be negotiating with most of its unionized workforce, including pilots, flight attendants, and maintenance workers.

Labor costs are airlines biggest expense and they have become a larger portion of overall costs, the report added. Last year, labor costs ate up 28% of U.S. airlines $187 billion in revenue, up from a 21% share in 2008, as airlines hired more workers and compensation rose,according to data from trade group Airlines for America.

For more real estate trends, visitETFTrends.com.

View original post here:
Delta Air Develops A.I. Tool to Address Weather Disruptions - ETF Trends

Bayer and Exscientia collaborate to leverage the potential of artificial intelligence in cardiovascular and oncology drug discovery | More News | News…

DetailsCategory: More NewsPublished on Friday, 10 January 2020 08:21Hits: 1292

BERLIN, Germany I January 9, 2020 I Bayer and Exscientia Ltd., a UK-based Artificial Intelligence (AI)-driven drug discovery company, have entered into a three-year, multi-target collaboration. The partners will work on early research projects combining Exscientias proprietary AI drug discovery platform and drug design know-how with Bayers data and drug discovery capabilities. They aim to identify and optimize novel lead structures for potential drug candidates to treat cardiovascular and oncological diseases. Exscientia may be eligible to receive up to EUR 240 million, including upfront and research payments, near term and clinical milestones. As part of the agreement, Exscientia may also receive sales royalties. Bayer owns the rights to novel lead structures generated as part of the collaboration.

AI has the potential to accelerate drug discovery and improve the drug development productivity in terms of quality, cost and cycle time. Up to now, it takes 12 to 15 years from early research to marketing approval of a new drug. The collaboration focuses on early stage research by using an AI-based algorithm to predict potential drug molecules. Exscientias AI-driven drug discovery technology provides novel chemical matter for difficult-to-address targets and could identify novel drug candidates more efficiently through less optimization cycles.

We are driving forward digital transformation in R&D as we believe that digital technologies such as AI can simplify and speed up the discovery and development of new drugs for patients, said Dr. Joerg Moeller, Member of the Executive Committee of Bayer AG's Pharmaceuticals Division and Head of Research and Development. The collaboration with Exscientia is expected to help us to achieve project milestones earlier and at the same time accelerate timelines by enabling more precise identification of suitable drug targets and lead structures.

Were delighted to collaborate with Bayer, a globally recognized pharmaceutical company who has already committed significant investment to treating challenging diseases, said Professor Andrew Hopkins, CEO of Exscientia. Since our pioneering Nature papers demonstrated the automated design of small-molecules, we have enhanced our platform and exemplified it commercially, by accelerating the discovery of future drug molecules with partners. Were excited to now work with Bayer researchers to drive this transformational change in key therapeutic areas.

The Pharmaceuticals Business Development & Licensing team of Bayer facilitated this collaboration.

About artificial intelligence at Bayer PharmaceuticalsArtificial intelligence provides significant opportunities for Bayers Pharmaceuticals business. Bayer is committed to realizing the potential value associated with big data, advanced analytics, and artificial intelligence, as it continues to explore and leverage them along the value chain. Bayer believes that there are three ways that artificial intelligence could be applied in our business: to strengthen and accelerate innovation, to advance operations and to identify new business opportunities. Such technologies could therefore support Bayer in getting the right treatment to the right patient at the right time, more efficiently and faster than we do today.

About ExscientiaExscientia is at the forefront of Artificial Intelligence (AI)-driven drug discovery and design. By fusing the power of AI with the discovery experience of seasoned drug hunters, Exscientia is the first company to automate drug design, surpassing conventional approaches. For more information visit http://www.exscientia.ai or follow on Twitter @exscientialtd

About BayerBayer is a global enterprise with core competencies in the life science fields of health care and nutrition. Its products and services are designed to benefit people by supporting efforts to overcome the major challenges presented by a growing and aging global population. At the same time, the Group aims to increase its earning power and create value through innovation and growth. Bayer is committed to the principles of sustainable development, and the Bayer brand stands for trust, reliability and quality throughout the world. In fiscal 2018, the Group employed around 117,000 people and had sales of 39.6 billion euros. Capital expenditures amounted to 2.6 billion euros, R&D expenses to 5.2 billion euros. For more information, go to http://www.bayer.com.

SOURCE: Bayer

See more here:
Bayer and Exscientia collaborate to leverage the potential of artificial intelligence in cardiovascular and oncology drug discovery | More News | News...

Encryption Will Take Center Stage in 2020 – Security Boulevard

In the past, technology was a topic of discussion primarily among engineers and scientists. Debates would erupt over technology, but they were confined to esoteric conferences, labs or lecture halls.

Our connected world has changed all that. Now its not unusual for people to talk about technology its benefits, challenges and social implications. And those people are not always technical experts.

AI and autonomous cars, cloud, connected medicine and data breaches continue to be hot topics. But various policy and societal factors are pushing another technology issue encryption into the collective consciousness. Thats why we can expect 2020 to be the Year of Encryption.

This year, dialogue about encryption from a business, consumer and policy standpoint will reach a crescendo. This will happen in the U.S. and beyond. Here are a few examples.

Businesses are stepping up their strategies to ensure compliance with the 2020 California Consumer Privacy Act (CCPA). CCPA, which took effect Jan. 1, gives California residents control over their personal data. This will prompt more discussion and education about personal data privacy. And that will give businesses new incentives to employ encryption technology.

Theres movement on encryption at the federal level, too. A bipartisan group of Capitol Hill lawmakers have re-energized a push for encryption backdoors. And the Australian, U.K. and U.S. governments are pressuring Facebook to scrap plans for end-to-end encryption of Facebook Messenger.

Meanwhile, organizations with an international presence continue their work on General Data Protection Regulation (GDPR) compliance. They also must understand how Brexit will impact regulations governing storage and sharing of sensitive data. Such efforts have new urgency given that British lawmakers in December approved the Brexit bill. And businesses want to avoid the significant GDPR fines theyve seen some of their peers absorb.

As for consumers, they want more control and privacy over their data. And the advancement in facial recognition software and concerns about voter information protection leading up the U.S. election only amplify their concerns. Yet consumers are often confused about what data privacy really means and how to enable it.

But a growing number of individuals are now aware that encryption is part of the conversation. Encryption may never be a water cooler topic of conversation on par with Game of Thrones. However, in 2020, it will be more readily understood, discussed and debated than ever before.

Weve also been hearing about the arrival of the autonomous car for some time now. Autonomous cars were once a futuristic idea. But theyre here today, and several businesses have been investing in and experimenting with them.

That has prompted people to talk about autonomous vehicles and their potential benefits and dangers. When these vehicles first arrived on the scene, much of the talk was about their benefits. But experiments dont always go as planned; in fact, some are catastrophic failures.

This highlights the need for organizations to devote more time and effort to tackle the challenges autonomous vehicles present. (One of those challenges involves how to prevent tampering by bad actors.) As a result, the broad use of autonomous cars will be further in the future than originally expected. And the use cases for these vehicles largely will be limited to short distances and specific routes and speeds.

Cloud technology also continues to move forward while simultaneously taking a step back.

On the forward-moving front, worldwide public cloud spending is expected to approach $500 billion in 2023. If that plays out, it would be more than twice the public cloud spend from 2019.

But while adoption of public cloud is growing, many organizations are revisiting private cloud strategies. This boomerang effect is occurring as some organizations realize public cloud doesnt meet all their needs. That is sometimes due to security issues or the challenges of having to rewrite applications. As a result, many organizations that had planned to go 100% public cloud are opting to also use on-premises resources.

If you thought house calls were a thing of the past, think again. Like the cloud, medicine is also now coming back in house, at least to some extent.

In the year ahead expect to see more medical devices make their way into our homes. That includes equipment like breathing machines that used to be found solely in medical facilities.

Technological advances are now enabling manufacturers to make these devices smaller. And the fact that these devices are connected means they can be used at home. That can save time and money for consumers and the medical industry.

Data breaches continued to rise in 2019. And the growing number of medical and other connected devices only increases the threat surface and raises the stakes of cybersecurity. And our data-rich medical records have become the gold standard for todays cyber thieves.

That said, organizations must do more to safeguard the health and well-being of their customers. That involves having the right cybersecurity and personal data protection measures and technology in place.

But they need to do that without creating a lot of friction for their customers.

Finding the right balance is a significant challenge. But its worth the time and effort for organizations, which should figure encryption into the equation.

Too little security can result in loss of business, reputation and even stock value. Meanwhile, the right balance enables compliance, builds trust and allows for business growth and longevity.

Link:
Encryption Will Take Center Stage in 2020 - Security Boulevard

Encrypted Traffic Analysis Will Be Mandatory Soon – Security Boulevard

Although today much of the internet traffic is encrypted, attackers can still exploit it. While the need to examine encrypted traffic is obvious, the way to carry out decryption often remains a conundrum. Decrypting traffic can introduce performance bottlenecks and introduce potential privacy and compliance issues if the traffic is fully unshrouded. Finding a way to maintain performance and ensure compliance while also being able to properly examine traffic is becoming critical.

Encrypted traffic needs to be examined to uncover potential functions for controlling botnets and malware that are often hidden within secure tunnels. Examining encrypted traffic will also help investigate various issues. Take, for instance, a workstation that abruptly started to communicate using an outdated encryption algorithm. Such is likely a clear sign of being compromised. Or consider users communicating with servers with untrusted certificates. The ability to analyze encrypted communications such as these is growing more crucial each day for the effective enforcement of security policies.

While only half of internet traffic was encrypted in 2017, today it is over 80%. The era of a fully encrypted internet is already knocking on the door and, naturally, professionals responsible for security and risk management in companies are paying more attention. Encryption complicates the use of traditional security technologies, such as firewalls, and also often makes their use impossible. If you do not know what is hiding in packets, you cannot fully protect the corporate network or individual workstations from malware.

Today, the analysis of encrypted communication should be part of the portfolio of network monitoring and security for every company. Some security solutions are adding such capability, providing the ability to analyze header information of encrypted traffic without having to open the payload. Thanks to this functionality, enterprises are now able to display important details of encrypted communication, including detecting hidden malware. However, the encrypted content cannot be viewed without decryption. So it is important to get as much information as possible when the communication is not yet encrypted during the process of establishing the connection when the exchange of encryption keys and certificates is being conducted.

An example of this connection setup is a SSL/TLS handshake, which is required for establishing encrypted communication during which different TLS parameters are available and visible, including the TLS protocol version used by the server, encryption set, server name (SNI) indication, certificate issuer, public key, certificate validity, JA3 fingerprint and more.

The connection data can then be analyzed or used in different ways to manage the security of the organization. Based on the data, one can receive notifications of changes and events or use it for automatic alerts that are linked to other actions (emailing, running a user script, sending a syslog or an asynchronous notification in the form of an SNMP trap, etc.).

One of the easiest ways to detect malware and process indicator of compromise (IoC) is to analyze JA3 fingerprints. Using JA3 method, one can easily create SSL/TLS fingerprints on any platform. It is much more effective to use JA3 fingerprints to detect malware within SSL/TLS than to monitor the IP or domain IoC. It does not depend on whether the malware uses domain generation algorithms (DGA) or changes the IP addresses for each of its command and control (C2) hosts, not even when it uses, for example, Twitter, to control it. Since JA3 detects a client application directly, it can detect malware based on how it communicates instead of what it communicates through. Thanks to this, special tools such as those in Flowmon, in cooperation with the publicly available JA3 fingerprint database, can detect potential threats from specific JA3 fingerprints in encrypted communication.

Many companies rely on HTTPS communication and certificates issued by a certification authority for a given period to secure their internal communication or web presence. It is important to monitor the validity of the issued certificate to avoid a situation where data remains unsecured for some time. This can be elegantly solved by analyzing encrypted traffic, which provides, among other things, an overview of each certificates expiration. This allows one to monitor expiring certificates and completely avoid the problem of expired certificates altogether. One can also easily detect weak TLS 1.0 encryption with enough time to take all the necessary corrective steps.

Some security solutions provide encrypted traffic analysis on two levels. The first focuses on cryptographic evaluation, i.e. examines versions of the SSL/TLS protocol, cyber suite (encryption algorithms, key lengths) and certificates, while the second focuses on monitoring and security. It offers JA3 fingerprints for possible identification of malware or infected stations and ALPN for identifying protocols in encrypted communication and examines SNI and many other parameters.

For reliable threat protection, companies eventually will need to incorporate security tools based on behavioral analysis, artificial intelligence and encrypted communication analysis. These tools promise to detect malware in real-time encrypted traffic without impacting network throughput or degrading application performance. It will also require changes to existing security strategies to stop man-in-the-middle threats or attempts to steal corporate data promptly.

New security technologies such as these will be indispensable for not just protective security, but also for auditing. The technologies will help detect communications that use outdated certificates in violation of company policy, control the encryption strength or reveal data encryption vulnerabilities. Most organizations today can only get to such detailed overviews at the cost of laborious and time-consuming methods.

In a way, we can apply the Socrates dictum about the unexamined life not worth living to network security. Unexamined traffic undercuts all of the other important security methodologies and makes them not worth having, providing a way for attackers and bad actors to gain access to resources right under the nose of security inside encrypted tunnels. These need careful examination and can be done largely without performance penalties and compliance exposure.

See original here:
Encrypted Traffic Analysis Will Be Mandatory Soon - Security Boulevard

Debate over access to encryption isn’t going away – Washington Examiner

Expect the U.S. Department of Justice and officials from allied countries to push harder for large technology companies to give them access to customers' encrypted communications, and expect the tech companies to continue to resist.

The current push for tech companies to provide encryption backdoors started back in 2014, when then-FBI Director James Comey complained about law enforcement agencies "going dark" because of a lack of access to encrypted email, texts, and other communications. But current Attorney General William Barr and allies in the United Kingdom and other countries have stepped up the pressure on tech companies in recent months.

Encryption has "empowered criminals" as terrorists, human traffickers, and sexual predators shield their activities from police, Barr said in a speech in October. "As we work to secure our data and communications from hackers, we must recognize that our citizens face a far broader array of threats," he said. "While we should not hesitate to deploy encryption to protect ourselves from cybercriminals, this should not be done in a way that eviscerates society's ability to defend itself against other types of criminal threats."

The debate shifted into high gear in December. On Dec. 9, Facebook sent a letter to U.S., U.K., and Australian officials, rejecting their request that the company scrap its plans to offer end-to-end encryption across messaging services.

"We all want people to have the ability to communicate privately and safely, without harm or abuse from hackers, criminals, or repressive regimes," the letter said. "Every day, billions of people around the world use encrypted messages to stay in touch with their family and friends, run their small businesses, and advocate for important causes. In these messages, they share private information that they only want the person they message to see."

A day later, in a Senate Judiciary Committee hearing, Chairman Lindsey Graham threatened Facebook and Apple officials with legislation if they didn't give law enforcement encryption back doors.

"You're going to find a way to do this, or we're going to go do it for you," said Graham, a Republican from South Carolina. "We're not going to live in a world where a bunch of child abusers have a safe haven to practice their craft. Period. End of discussion."

Many cybersecurity experts, however, have warned against the push for encryption back doors.

If law enforcement agencies get access to encrypted communications, it's only a matter of time before criminals figure it out, said Michael Frederick, CEO of software development firm Flatirons Development. There is no "middle ground" compromise to the encryption debate, he added.

"Any back door that is open to law enforcement to allow them to access encrypted materials will inevitably be discovered and abused by those with malicious intentions," he said. "That could be hackers in the U.S., or it could be overseas governments taking advantage of the loophole, presenting a risk to our national security."

When the loophole is discovered and shut down, "we will start this conversation over again," he predicted.

It's "impossible" to allow law enforcement access without also risking hacker access to encrypted communications, added Daniel Goldberg, security researcher at Guardicore, a cloud and data center security vendor.

"Regardless of the method, whether its key escrow or weakened access or any other buzzword of the month, encryption only works if it's total," he said. "If we go down this path, not far is the day when criminal groups or nation-states will have easy access to all private communications of common citizens."

Nevertheless, the push for access isn't all "fear, uncertainty, and doubt," Goldberg added. "By choosing privacy for all citizens, we also allow privacy to criminals," he said. "Law enforcement today relies on a hodgepodge of methods that try to go around end-to-end encryption, allowing sophisticated criminals freedom of action."

Meanwhile, security experts were split in their predictions on whether Congress would act to require law enforcement access. Some saw too much disagreement in Congress to move forward, while others predicted eventual action to require some type of access.

"Unfortunately, I can see Congress, in light of a national emergency or threat, taking action to weaken individual access to encryption technology," said Llewellyn Gibbons, a cyberlaw professor at the University of Toledo College of Law. "I doubt that Congress will take action on this as part of a reasoned debate that considers the commercial as well as individual privacy concerns."

Congressional action would be a significant change in U.S. government policy related to the internet, Gibbons added. "Such a change would be a dramatic shift from the self-government model that the U.S. government has encouraged on the internet."

View post:
Debate over access to encryption isn't going away - Washington Examiner

San Bernardino 2.0: FBI Asking Apple To Crack Encryption On Phones Owned By Pensacola Naval Station Gunman – Techdirt

from the encryption-is-letting-dead-men-get-away-with-crimes-they-already-committed dept

It looks like the FBI wants to relitigate the San Bernardino shooting. After that tragedy, the FBI tried (and failed) to obtain legal precedent forcing cellphone manufacturers to crack open seized phones at the drop of a warrant. Finally, a third party sold a solution to the FBI that opened the phone and allowed it to recover nothing useful whatsoever from the shooter's device.

The FBI was displeased that it didn't get this precedent. Internal communications showed FBI officials were doing everything they could to avoid using a third-party solution. The theoretical existence of evidence related to a tragic shooting was the only leverage the FBI had and a private company's cracking service took that leverage away. It could no longer claim approaching Apple directly was the only way to access the contents of the phone.

The FBI is trying again. It has more locked phones and another shooting to use as leverage.

The FBI is asking Apple Inc. to help unlock two iPhones that investigators think were owned by Mohammed Saeed Alshamrani, the man believed to have carried out the shooting attack that killed three people last month at Naval Air Station Pensacola, Florida.

In a letter sent late Monday to Apple's general counsel, the FBI said that although it has court permission to search the contents of the phones, both are password-protected. "Investigators are actively engaging in efforts to 'guess' the relevant passcodes but so far have been unsuccessful," it said.

Apple is helping the FBI but it's not doing the only thing the FBI really wants it to do. Apple's statement says it's already turned over "all the data in [Apple's] possession." But it's not going to break the devices' encryption.

And no matter what legal precedent the DOJ obtains -- should it decide to force the issue by seeking a court order compelling decryption -- it still may not find anything useful, or indeed anything at all, if it manages to unlock the devices. There's a twist in this case that sets it apart from the San Bernardino shooting.

A law enforcement official said there's an additional problem with one of the iPhones thought to belong to Alshamrani, who was killed by a deputy during the attack: He apparently fired a round into the phone, further complicating efforts to unlock it.

Shooting someone right in the evidence is a new logistical hurdle -- one that probably can't be cleared with a stack of legal paperwork and precedent. But this is the FBI's latest attempt to undermine device encryption. Attorney General Bill Barr has made it clear he feels encryption is only good for criminals. If the DOJ decides to take another run at this, it will be less likely to back down even if presented with a third-party solution.

The FBI and DOJ are always on the lookout for another tragedy to use as leverage for anti-encryption precedent. Unfortunately, this country produces more than its share of mass shootings, so the FBI and DOJ will always have plenty to work with.

Filed Under: doj, encryption, fbi, going dark, pensacolaCompanies: apple

Read the rest here:
San Bernardino 2.0: FBI Asking Apple To Crack Encryption On Phones Owned By Pensacola Naval Station Gunman - Techdirt

#Privacy: Self-Encrypting Drives are the answer to data protection concerns now and in the future – Security Boulevard

The data protection landscape is rapidly changing in scope, breadth and depth. With changes to data protection laws in recent years, organisations today must keep up with all that is happening in the world of data protection.

Data protection no longer solely applies to risk management such as business continuity and disaster recovery, but also governance and compliance.

The protection of electronically stored information in all its different expressions should be at the forefront of any business. The permanent physical loss of key information, such as customer account information or the loss of confidentiality of sensitive information, could have a severe negative impact on a business and bring with it huge penalties and legal costs.

The loss of confidentiality of information through a data breach can carry high security threats and put businesses of all sizes at risk.

As data and business processes evolve with technological advances, enterprises are actively examining how to improve the data protection function from the perspectives of people, processes and technology. The key to choosing the data protection technologies is to understand the overall data protection infrastructure portfolio into which individual data protection technologies should fit.

The strength is in the hardware

As a solution, data encryption has received strong endorsement from the enactment of state, federal and international data protection legislation. Over the years, the disadvantages of software-based encryption have become increasingly recognised in the industry.

After all, software encryption is only as secure as the rest of the computer or smartphone. In software encryption, there are more possible attacks vectors that can lead, among others, to the ability for a hacker to crack the password. Software encryption tools also share the processing of your computer, which can cause the whole machine to slow down as data is encrypted/decrypted.

Unfortunately, some users remain unaware of the potential to solve these problems with hardware-based encryption. Through an industry-wide, open specification for hardware-based Self Encrypting Drives (SEDs), e.g., Opal Family Specifications, developed by Trusted Computing Group (TCG), the issues caused by software-based encryption are being addressed and the reasons for using a SED continue to grow.

SEDs are storage media that perform on-board encryption/decryption, as well as pre-boot authentication, maintain hashed passwords and offer on-the-fly erasure. In a SED, the entire drive, including the Master Boot Record (MBR) is encrypted and write protected at rest. As a result, the master boot record cannot be corrupted.

Compared to software-based encryption, hardware-based encryption built into a drive offers simplified management, interoperability among drives from different vendors and most importantly no performance impact. In fact, using a SED is much more cost-effective than buying higher performance main laptop processors when software Full-Disk Encryption (FDE) is used. SEDs integrate to systems and image the same as non-encrypting drives, with no initial encryption necessary, nor re-encryption when drives are re-imaged.

SEDs and TPMs the perfect match for data protection

In order to ensure better security, strong user authentication is needed. With a SED, access to the platform is based on secure authorisation performed by the SED and not by the less-secure software that can be spoofed into allowing unauthorised access to data. Combining hardware-based encryption with Trusted Platform Modules (TPMs) can provide even stronger security benefits in personal computers and can be used in a multitude of ways.

The TPM is designed as a root of trust for the computing platform. It can measure components such as the Basic Input/Output System (BIOS) to determine if the system has been hacked or an unauthorised change has been made. The SED has areas of protected storage that can be used in conjunction with the TPM. One use of these protected storage areas would be to keep a copy of sensitive software such as the system BIOS or MBR. If the TPM detects that the BIOS or MBR has been hacked, a new, unaltered copy of the software can be loaded before the system boots, resulting in a self-healing system.

The combination of SEDs and TPMs can also assure strong authentication. In this instance, the SED would store an alternative operating system in a read-only area of the drive. When the locked SED is powered up, a shadow MBR is used to load this pre-boot Operating System (OS).

The purpose of the pre-boot OS is to allow the user to enter their authentication credentials such as passwords, fingerprints, smart cards, or other tokens which are used to unlock the SED so that the normal MBR and OS can be loaded. Even though the SED protects the pre-boot OS from being altered, the TPM can be used to provide another layer of security by measuring the pre-boot OS each time it is loaded to assure that it has not been altered in an unauthorised way.

Some enterprises want to assure that a SED can only be unlocked by authorised users and in an authorised platform. The TPM can be used to store authentication credentials which are required in order to unlock the SED. At power up time, not only must the user enter their authentication credentials, but the TPM must be used in conjunction with the user authentication credential in order to produce the authentication credential which can unlock the SED.

Through combining hardware-based technologies like SEDs with TPMs, enterprises add another layer of security to their systems, ensuring the possibility of any loss of data is drastically reduced.

Protection against future security threats

Hardware-based encryption like that found in SEDs bring a lot of advantages including compliance, stronger security, integrated authentication and low total cost of ownership with an additional benefit of rapid data destruction or crypto-erase. While these convincing reasons remain valid, additional security scenarios provide even more compelling justification for organisations.

Corporations are reinitiating their spending and investments in technology for the future, with information security proving to be a key area to benefit from increased spending. With new approaches such as SEDs, corporations can obtain improved data security without the shortcomings of software-based encryption. Once potential users correctly and completely understand the capabilities of SEDs and the misconceptions are corrected as well, the increasing availability of SED options will provide the solution to cope with data security threats both now and long into the future.

By TCG Storage Workgroup

PrivSec Conferenceswill bring together leading speakers and experts from privacy and security to deliver compelling content via solo presentations, panel discussions, debates, roundtables and workshops.

For more information on upcoming events, visit the website.

We have been awarded the number 1GDPR Blog in 2019 by Feedspot.

Privacy Culture: Data Privacy and Information Security Consulting, Culture & Behaviour, Training, and GDPR maturity, covered.https://www.privacyculture.com/

Excerpt from:
#Privacy: Self-Encrypting Drives are the answer to data protection concerns now and in the future - Security Boulevard