Authentication In IoT: Securing the Front Door – IoT For All

We may not think about it much, but we truly live in a fascinating era of technology. Our devices are becoming smarter, and we aim to have them all online. The Internet of Things is thriving, boasting more connected devices than there are people on the planet.

And thats only the beginning.

Although there is always a dark side to progress in the case of IoT, its the race between the cybercriminals and development of cybersecurity, where one party still wants to be a step ahead of the other. The reasons are evident: with so many connected devices that perform such a variety of tasks, the opportunities for taking advantage of them are endless. Among the tools that can stop or slow down hackers, strong authentication is the one thats been around for a while. Still, it has to change as well. So what is the future of authentication for the Internet of Things?

In a typical IoT infrastructure, a vast number of interconnected and distributed devices communicate with each other. This principle makes it crucial to have a strong, reliable, and scalable authentication method in place where each IoT device is properly authenticated to ensure its genuine and to prevent unauthorized IoT devices from being installed on the network.

When an IoT device communicates with another peer device they need to identify each other and verify their identity to each other to establish Authentication. This is obtained through cryptographic methods that may vary in terms of complexity and level of security.

However, in an IoT infrastructure, the 2FA/MFA system can be more complex, requiring hardware tokens, separate devices or even biometrics (facial recognition, retina scan, fingerprint, etc.) to improve security. Its essential for IoT as this system has to ensure that its approvedto perform administrative actions for IoT devices. This is what the security depends on since many IoT devices dont have physical User Interfaces (UIs) and must rely on administrator actions.

Technically, there is a real challenge to initiating a secure communication between two IoT devices. This means that in case a public-key cryptographic authentication method is used, there should be a way to ensure that the public key is received by a peer IoT device belongs to the intended communication channel and that the peer IoT device can be trusted. This requires that the public key be stored securely on the device in the sense that its integrity is preserved. It must not be possible for an attacker to modify the key or to use another fake key instead The latter concerns the digital certificates which are commonly used in such a scheme.

When it comes to user experience, the beauty of IoT partially lies in the variety of devices that can be interconnected. However, thats also the ultimate nightmare of its security, as hardware and software differences between various IoT devices make it much harder to come up with a security solution that would be applicable in every case. Piling on to this issue, manufacturers and developers of IoT devices often dont develop a securitysolution for their productto reduce costs.

Authentication might be the answer if we can make it simpler and more efficient. Authentication methods implemented should be strong enough to be resilient against different attacks, such as eavesdropping/spying, replay attacks, MiTM attacks, dictionary attacks, or brute-force attacks.

Also, in IoT, its vital to use the same strong authentication for multiple devices that are commonly used (considering some devices have no Human Machine Interface (HMI), it could be a gesture, a GPS-location or silent authentication), and be faster and more convenient than our current 2FA/MFA processes.

To improve security, all sensitive data such as keys and biometrics should stay on the device itself. Ideally, you should be able to authenticate yourself to your device locally, and then it would validate the user online using public-key cryptography. This would eliminate the need to have any link-ability between different accounts or services, vastly improving security. FIDO authentication protocol could be the best security option to re-use.

IoT security presents a challenge, but with how IoT has been developing, cybersecurity has to be an absolute priority.Solving security concernsby securing the front door through strong and smart authentication will bring us a step closer to more fascinating technological developments.

Here is the original post:
Authentication In IoT: Securing the Front Door - IoT For All

Jihadi Use Of Bots On The Encrypted Messaging Platform Telegram – Middle East Media Research Institute

Table of Contents

Introduction

A History Of Terrorist Bots On Twitter

The MEMRI JTTM Team: For Over Two Years, Monitoring Bots Spreading ISIS Content On Telegram

Creating Bots On Telegram

Jihadi Use Of Bots On The Encrypted Messaging Platform Telegram

Swearing Allegiance To ISIS

Discussing And Sharing Instructions For Online Security, Secure Communications, And Hacking

Sharing Information About Jihadi Channels, Archives, And Materials

Disseminating Warnings To Followers

Other Uses

Fundraising

Announcements Of New Bots And Requests For Distribution

Sharing Information About Jihadi Channels, Archives, And Materials

Sharing Information About Jihadi Channels, Archives, And Materials

Sharing Information On Training, Bombmaking, Weapons, And Recruiting

Introduction

Bots, or chatbots short for "chat robot" are computer programs that simulate human conversation "chat" through artificial intelligence.[1] They are typically created to carry out repetitive, pre-defined tasks more efficiently than humans.[2] They can be used for ecommerce, customer service, and content distribution; one common type, the chatbot, simulates conversation, while other types can schedule social media or other posts or create polls. Platforms such as Facebook Messenger,[3] Twitter,[4] and WhatsApp[5] offer bot integration. Botnets are connected computers performing monotonous tasks to keep websites going.[6] They are also becoming companions for people: In April 2020, half a million people downloaded an app called Replika that allows the user to converse with a human-like robot over text. While that app is not entirely convincing, some experts believe a completely convincing chatbot will exist in five to 10 years.[7]

Bot technology is also used for illegal purposes for example, sending spam and phishing emails containing malware, engaging in internet fraud, and trafficking in illegal goods and services. Illegal botnets gain control of computers through hacking or malicious coding and their owners can then use these computers to carry out DDoS attacks, email spam to many more millions of Internet users, generate fake Internet traffic, and extort ransom from users.[8]

To keep pace with China's ambitious artificial intelligence development, on February 11, 2019,[9] President Trump signed an executive order announcing the American Artificial Intelligence Initiative.[10] This strategy, according to the White House, is a concerted effort to promote and protect national AI technology and innovation, that "implements a whole-of-government strategy in collaboration and engagement with the private sector, academia, the public, and like-minded international partners." The move followed calls from AI experts[11] across industry, academia, and government to prioritize development of this area, including a May 2018 memo from then-defense secretary James Mattis asking the president to create a national strategy for AI. At the same time, however, there has so far been little research into how terrorist groups are already utilizing some of the basic forms of AI available to them, such as bots.

A History Of Terrorist Bots On Twitter

Every day, bots are being used by jihadis, especially on Telegram, for a wide variety of purposes. Highlighting these uses just recently was the pro-Al-Qaeda Jaysh Al-Malahim Al-Electroni Telegram channel that announced, on July 20, 2020, that it was recruiting supporters with expertise in programming, "media raids," film montage, hacking, translation, and graphic design. Those interested, it added, should make contact using its bots.[12] The same day, the pro-ISIS Basa'ir Da'wah Foundation, on Telegram, urged supporters, especially designers, poets, and religious students, to join the foundation's team by contacting its bot on the platform.[13]

Jaysh Al-Malahim recruitment notice; Basa'ir Da'wah Foundation recruitment notice

Also, on July 23, the pro-Al-Qaeda Jaysh Al-Malahim Al-Electroni announced that it was seeking a commentator with excellent Arabic for its videos and asked candidates to apply to its Telegram bot.[14]

The recruitment notice referring candidates to Jaysh Al-Malahim Al-Electroni's Telegram bot

A pro-ISIS Telegram bot warned, on August 3, that intelligence and "Rafidites" Shi'ites had infiltrated pro-ISIS groups on Telegram and were creating fake accounts under the names of genuine ISIS supporters. It named three specific Telegram accounts claiming to be pro-ISIS that it said were actually run by Shi'ites.[15]

Underlining how bots are energizing jihadis' daily social media efforts, on August 5, Jaysh Al-Malahem Al-Electroni released a poster titled "We Remain in the Media Battle, Victorious." It depicts an armed fighter with the logos of Telegram, Instagram, Facebook, Pinterest, LinkedIn, YouTube, and Twitter.[16]

As early as 2015, when it was estimated that bots made up over half of all Internet traffic, ISIS was already known to have created thousands of Twitter bots to disseminate violent content, raise funds, and recruit supporters, as well as jamming activist communication on the platform, silencing their opponents on Twitter.[17] The bots latched onto trending hashtags to send out a stream of pro-ISIS messages a tactic adopted by ISIS as early as 2014[18] with the aim of inserting ISIS into ongoing conversations on different topics. Following the November 2015 Paris ISIS attacks, the international hacktivist group Anonymous launched a campaign against ISIS bots across the Internet under the hashtag #opISIS, shutting down over 25,000 of them within a month.[19]

After ISIS leader Abu Bakr Al-Baghdadi was killed by U.S. forces in late October 2019, Mustafa Ayad, a terrorism researcher at the London-based Institute for Strategic Dialogue, noticed on Twitter that many ISIS tweets were being posted faster than humanly possible. Accounts posting them that were suspended quickly returned with slight changes in usernames to avoid detection, while other accounts posting the content appeared to have been hacked. Twitter said that between January and July 2019 it had suspended more than 115,000 accounts for terrorism-related violations.[20] Telegram CEO Pavel Durov has stated that he takes steps to remove jihadi accounts and content on the platform, and has on occasion taken limited action to do so, but the accounts generally return.

A May 20 virtual forum held by the House Homeland Security Committee tackled the question of whether the coronavirus pandemic is fueling extremism on social media. Session co-host Rep. Max Rose, chairman of the Intelligence and Counterterrorism Subcommittee, said: "Terrorists' use of the Internet has been magnified by this public health crisis, with social media and gaming platforms increasingly being used for recruitment and propaganda here and around the world particularly as people spend more and more time online at home."[21] Bots are one technology that makes spreading that misinformation and messaging easier for extremist groups.

The MEMRI JTTM Team: For Over Two Years, Monitoring Bots Spreading ISIS Content On Telegram

As part of the work of the Cyber Jihad Lab team, which studies terrorists' use of technology, and of the MEMRI Jihad and Terrorism Threat Monitor (JTTM) team, over the past two years both teams have documented and identified the accounts in this report on the encrypted messaging app Telegram that are using bots. In October 2019, Telegram's @ISISWatch channel claimed to have blocked 7,431 terrorist bots and channels, many of which were used to launch campaigns for fundraising using cryptocurrency.[22] @ISISWatch was created the day after MEMRI exposed Telegram as ISIS's and jihadis' "app of choice" in a report published December 23, 2016 a report that made the front page of The Washington Post.[23] At that time, ISISWatch stated that Telegram "actively bans ISIS content on Telegram," that it was shutting down "an average of 70 ISIS channels" each day, and that between September and December 2016 it had shut down nearly 8,000 "ISIS bots and channels."[24] Nevertheless, Telegram remains a haven for jihadi communications, outreach, recruiting, and other activity even though the ISISWatch channel continues to report daily on terrorist bot and channels it claims to have removed.

Creating Bots On Telegram

Telegram allows users to create bots for sending, responding to, and otherwise managing messages, news, and notifications. They can also be used to manage digital assets such as cryptocurrencies.[25] Telegram's @BotFather tool walks users through the process quickly and easily, and provides support for questions connected to the process.[26]

To create a bot, the user first searches for @BotFather on Telegram, and then clicks on it to begin the process:

The user is then asked to create a name and username for the new bot. Once this is done, Telegram generates a unique link to the bot where the user can add a description, about section, and profile picture, and directs the user to a list of commands that it can be programmed to carry out.

To view a video of the creation of a Telegram bot, click here or below:

JIHADI USE OF BOTS ON THE ENCRYPTED MESSAGING PLATFORM TELEGRAM

Telegram's popularity among jihadis over the past five years has been well documented; for example, since 2015,[27] the Islamic State (ISIS) has used it in an official capacity, to disseminate calls for violence and share detailed instructions on how to carry out terrorist attacks, and to coordinate attacks an early example being the 2015 Paris attacks.[28]

ISIS, Al-Qaeda, and other jihadi organizations as well as their supporters are using bots on Telegram to disseminate their messaging in a variety of languages. They can be created in a chat or channel to allow them to connect with users. The bots can handle messages, with group members conversing with the bot as with a human. The MEMRI JTTM has been monitoring jihadi bots on Telegram since 2015.[29]

The examples below show how jihadi organizations ISIS, Al-Qaeda, Hay'at Tahrir Al-Sham (HTS), the Somali Al-Qaeda affiliate Al-Shabab Al-Mujahideen, the Gaza-based Jaysh Al-Ummah, and Kashmiri jihadi groups and their supporters, and other jihadis, are using bots on Telegram for a wide range of purposes.

While one major use is for mass dissemination of official notifications, publications, and video productions, these groups also use bots designed to allow users to access archives of jihadi content produced by groups and media organizations. The archives were found to include content from Turkestan Islamic Party (TIP), Voice of Islam, Al-Qaeda in the Arabian Peninsula's (AQAP) Al-Malahem Foundation, Libyan Al-Rayah Foundation, Al-Shabab's Al-Kata'ib Foundation, Al-Qaeda In The Islamic Maghreb's (AQIM) Al-Andalus Foundation, Al-Qaeda media group Global Islamic Media Front (GIMF), Group for the Support of Islam and Muslims (GSIM) Al-Zalaqah Foundation, and Jabhat Al-Nusra's (JN) Al-Manarah Al-Bayda' Foundation.

Also found in the archives was content from jihadi factions in Syria, Iraq, Chechnya, Bosnia, Egypt, Tunisia, and Libya, and from jihadi leaders past and present, including Osama bin Laden, Al-Qaeda leader Ayman Al-Zawahiri, HTS leader Abu Muhammad Al-Joulani, and Syria-based cleric Abdullah Al-Muhaysini.

Bots used by jihadis also allow users to request information and publications and register for courses, for example for physical fitness and bombmaking; solicit documents for later publication; submit and answer questions about migrating to Syria or Iraq, about technology, and about other subjects; widely share links to new Telegram channels following shutdowns; share tutorials on cyber security; use and hack accounts on social media platforms; recruit volunteer translators, video editors, and others; request donations for poor families, including families of slain jihadis; announce new accounts in multiple languages; promote causes such as supporting or freeing women from Al-Hol camp in Syria; and even convey holiday wishes.

This report documents the past two years of the JTTM's monitoring of jihadi use of bots for recruiting, fundraising, plan hacking and terror attacks, and more. It includes their use by major terrorist groups ISIS, Al-Qaeda, and others and by the most influential hacking groups and cyber activists. This use of bots a sophisticated tool made readily available to the public of social media users is a sign of what is to come: Jihadi groups will be using them much more in the future, and the West needs to be prepared to stop this before it happens.

ISLAMIC STATE (ISIS)

Planning Attacks, Sharing Information On Training, Bombmaking, And Weapons, Disseminating News, And Recruiting

The pro-ISIS Nasr News launched a new Telegram bot distributing official ISIS news in the Indonesian language: @NN20id_bot.[30]

On March 18, 2020, pro-ISIS Al-Tamkin Box launched a new Telegram bot, @Nooooooooods_bot, which distributes official ISIS news reports, official and unofficial videos, the Al-Naba' weekly, and articles by Al-Tamkin.[31]

JTTM subscribers can click here to view the full report

*Steven Stalinsky is Executive Director of MEMRI; R. Sosnow is Head Editor at MEMRI.

[1] Voxprogroup.com/iot-and-ai/ai-machine-learning-and-bots-whats-it-all-about, May 2017.

[2] Cdn2.hubspot.net/hubfs/53/assets/hubspot.com/research/reports/What_is_a_bot_HubSpot_Research.pdf?t=1492209311951, accessed July 30, 2019.

[3] Blog.hootsuite.com/facebook-messenger-bots-guide, May 9, 2019.

[4] Chatbotslife.com/how-to-make-a-twitter-bot-841b20655328, January 9, 2018.

[5] chatbotsmagazine.com/a-step-by-step-guide-to-creating-whatsapp-chatbot-for-business-275dc3924b17, May 14, 2019.

[6] Us.norton.com/internetsecurity-malware-what-is-a-botnet.html.

[7] Nytimes.com/2020/06/16/technology/chatbots-quarantine-coronavirus.html, July 16, 2020.

[8] Us.norton.com/internetsecurity-malware-what-is-a-botnet.html.

[9] Nbcnews.com/tech/tech-news/trump-s-artificial-intelligence-order-lacks-funding-not-target-china-n970406, February 11, 2019.

[10] Whitehouse.gov/ai/executive-order-ai/.

[11] Nytimes.com/2018/08/26/technology/pentagon-artificial-intelligence.html, August 26, 2018.

[13] Telegram/ Ghiras11bot, July 20, 2020.

[14] Talk.gnews.bz/channel/news-akhbar?msg=2yweGevZj58h2gpci, July 23, 2020.

[15] Telegram/ UI_BXH_X_BOT, August 3, 2020

[16] Telegram/ Al_MalahemCyberArmybot, August 5, 2020.

[17] Imperva.com/blog/bot-traffic-report-2014/, December 18, 2014.

[19] Businessinsider.com/anonymous-battles-isis-political-bots-2015-12, December 14, 2015.

[20] Npr.org/2019/11/01/775509366/twitter-struggling-to-shut-down-bot-and-impersonation-accounts-created-by-isis, November 1, 2019.

[21] Homelandprepnews.com/stories/49829-social-media-companies-must-use-ai-to-thwart-extremist-content-experts-tell-congressmen, May 27, 2020.

[22] Decrypt.co/11229/us-and-australian-officials-concerned-over-terrorist-cryptocurrency-use,November 7, 2019.

[25] Core.telegram.org/bots, accessed July 30, 2019; Coinrivet.com/what-is-a-cryptocurrency-telegram-bot, June 20, 2019.

[26] Core.telegram.org/bots/api, accessed July 30, 2019.

[28] See MEMRI report Germany-Based Encrypted Messaging App Telegram Emerges As Jihadis' Preferred Communications Platform Part V Of MEMRI Series: Encryption Technology Embraced By ISIS, Al-Qaeda, Other Jihadis September 2015-September 2016, December 23, 2016; MEMRI Daily Brief No. 192, Fears About New Facebook Cryptocurrency Are Overblown While Main Threat Of Criminal Activity On Telegram App Is Being Criminally Ignored, July 16, 2019; MEMRI Daily Brief No. 161, As Momentum Builds To Solve Problem Of Encrypted Terrorist Communications, A Possible Third Way Emerges, May 24, 2019; MEMRI Daily Brief No. 174, The Cryptocurrency-Terrorism Connection Is Too Big To Ignore, January 3, 2019; MEMRI Inquiry and Analysis No. 1387, The Imminent Release Of Telegram's Cryptocurrency, ISIS's Encryption App Of Choice An International Security Catastrophe In The Making, March 30, 2018; Congressional letter to Telegram CEO Durov, Memri.org/pdf/20181025_Telegram_sherman-Poe.pdf.

[29] Rsis.edu.sg/rsis-publication/cens/co15256-telegram-and-is-a-potential-security-threat/#.XUCPdOhKiUk, November 25, 2015.

[31] Telegram/ Ma Lakum Kayfa Tahkumun, March 18, 2020.

Originally posted here:
Jihadi Use Of Bots On The Encrypted Messaging Platform Telegram - Middle East Media Research Institute

Blockchain: How the Fourth Industrial Revolution can help …

Blockchain has been calleda pillar of the Fourth Industrial Revolution, comparing it to technologies such as the steam engine and the internet that triggered previous industrial revolutions. It has the power to disrupt existing economic and business models and may prove particularly valuable in emerging market economies.According to experts, blockchain also holds great promise as a method of fighting corruption, especially in Latin America and the Caribbean, where more smartphone penetration can facilitate the adoption of new technology.

But what is it? Simply put, a blockchain is a chain of digital blocks that contain information. Once the information has been created, it is very difficult to change. It includes information about the sender, the receiver, and the amount of currency.The data is trustworthy because it is bound in a strict framework of rules and cryptographic keys, and only people with the right key can access or modify the data.Blockchain also removes the need for an intermediary, such as a bank or a lawyer. In short, it facilitates transparency, which is the enemy of corruption.

Blockchain has been used for cryptocurrencies like Bitcoin, but many other possible uses are emerging, such as energy markets, digital identity, supply chain, health care and financial services. But there is one especially important for Latin America and the Caribbean: fighting corruption.

Corruption has a disproportionate impact on the poor and most vulnerable, increasing costs and reducing access to services, including health, education and justice,according to the World Bank. Corruption also impedes investment, with consequent effects on growth and jobs. According to aTransparency International survey, more than half of Latin Americans said that their government is failing to address corruption, and one in three people who had used a public service in the last 12 months said they had to pay a bribe.

Studies have shown that the poor pay the highest percentage of their income in bribes. In Paraguay, the poor pay 12.6 percent of their income to bribes while high-income households pay 6.4 percent. The lack of anonymity and the traceability of blockchain makes corruption more difficult than with traditional money. For example, if a government decides to construct a road, it could track how each dollar is being spent, identify all the users of the funds, and ensure that only those authorized to spend money do so on originally intended expenses. Fraud and corruption investigations that normally take months could be performed instantaneously. This type of financial tracking could be a deterrent for bribes in the public sector, in turn increasing development impact.

In Latin America and the Caribbean, only half of adults have access to banking services, however 90% of unbanked adults have a mobile phone. As smartphone penetration continues to grow, the popularity of virtual currencies is also growing. In Brazil, some companies and retail stores are accepting virtual currencies as payment. Colombia is also growing its presence in the cryptocurrency market in Latin America, as is Peru.

Chile also has a very active cryptocurrency community, but banks have been rejecting services to crypto-related companies and users. Both Chile and Argentina have been hosting cryptocurrency events and meetings. In Chile,LaBitConfhas attracted thousands of participants from all over the world interested in digital assets. In Argentina, Bitcoin continues to grow as well, and there are no major regulations threatening the industry. However, Bolivia and Ecuador are two of a few countries in the world in which Bitcoin is strictly banned.

The World Bank Group is working to ensure that economies in developing countries can harness these kinds of innovation to eliminate extreme poverty and boost shared prosperity. In August of 2018, the World Bank launchedbond-i, a blockchain operated new debt instrument, the worlds first bond to be created, allocated, transferred and managed through its life cycle using blockchain.

In Colombia, where low-resource and at-risk youth lack access to quality education and are often disincentivized to stay in school to complete a formal curriculum, the World Bank is exploring the opportunity to support youth education through social gaming, where they can earn tokens by solving global challenges.

The World Bank is also working on using blockchain to bring more transparency to supply chains. For example, blockchain could encourage farmers and the intermediaries who stand between farms and mills to enter more data about produce as it moves through the chain.

This Fourth Industrial Revolution can help accelerate progress towards development by helping prevent fraud and corruption.Yet the technology is in its early stages of development and serious challenges and risks, both technical and regulatory, will need to be addressed before it achieves widespread adoption. But the road is wide open.

Last Updated:Feb 07, 2019

See the original post here:
Blockchain: How the Fourth Industrial Revolution can help ...

Why you Should Care about Bitcoin Even if you don’t …

Bitcoin is indeed a rather surprising mix of frightfully clever ideas and frightfully simplistic mechanisms, as I argue in a recent paper. You can dismiss bitcoin as a doomed monetary experiment, but you must not pass over the opportunity to let your imagination run with it as it can shake some basic assumptions you have on how financial systems must work. Might there be some lessons in there for how to 'fix'what's broken in our financial system? Take it as an invitation to dream about the following three questions, which are based around the three basic design premises of bitcoin.

First: What if digital money was something that I could hold for myself and pass onto others, without necessarily having to go through a licensed financial institution? You can't do that now: you cannot hold digital money without becoming a customer of Citibank, PayPal or M-PESA. We've been delivered into their hands, and yet they do not necessarily see it their business to serve everyone. It didn't use to be that way: you can hold coins and bank notes by yourself, there is decentralized management of that. What if we held the option to serve ourselves financially with electronic payments, on a peer-to-peer basis, even if only as a countervailing power or last resort?

Second: What if we could build an entire digital money network which did not require any specialized infrastructure? Modern finance is burdened by ever more complex core banking platforms. Most other forms of digital content have gotten off specialized networks and converged onto the internet, simply by layering higher-level protocols on top of the basic internet protocol which take account of the unique technical needs of different applications. Bitcoin is just that: a set of higher-level protocols (not hardware!) which ensure that the digital value carried over the ubiquitous internet is uniquely and securely owned by someone and cannot be freely copied or double-spent by their owner.

Third: What if the digital money implemented through such mechanisms was actually an alternative or private currency? OK, to me this is the least interesting part of bitcoin, but unfortunately it's the one that has galvanized most attention. I think there will always be a need for some discretion in the management of money supply to accommodate economic shocks, and I don't see us trusting private entities with that power, much less foregoing it entirely and operating our money supply on a hard rule. Price volatility is inherent in such rudimentary treatment of money supply.

So take the first two ingredients only, and what we have is fiat (i.e. government-issued) money which can be held and passed on in a peer-to-peer fashion and operates over the open internet, resulting in a much more open, interconnected, contestable and lower-cost ecosystems for the delivery of payment and financial services. Centralized issuance but decentralized management of money once it'sout there. That takes out the traditional banking gatekeepers (per the first point) and massively reduces the cost of moving money around (per the second point).

It also opens up the floodgates of innovation, because financial services could then be implemented at the customer wallet application level, without necessarily having to touch or even consult any central services or centralized providers. (A crude example: you could set up a time deposit by telling your wallet rather than your bank to not give you access to your money.) Some call it the rise of programmable money. And indeed the most powerful lesson of the internet has been the blossoming of innovation brought on by a great centripetal force which pushes intelligence to the edge of the network.

So what would be the benefits of such a system? The cost of achieving financial inclusion would be vastly reduced, as people could gain financial access simply by downloading a secure application on their smartphone (which are coming for all) without requiring any provider's consent. We could economically extend electronic transactions down to very small transaction sizes, as sending money need not cost much more than sending an email.

We would also go in the direction of giving us more options to prevent or deal with financial crises, by increasing market discipline on banks. There would be a much more credible flight-to-safety option for people if they smelled a weak bank or a bubble. And in the event of banking distress, there would be a more credible let-it-fail option for regulators since our economy need not be so dependent on them.

I'm not saying we should do away with banks, they will still have a huge role to play intermediating funds. They can seduce me with attractive deposit interest rates and on-demand loans which my wallet may not be able to negotiate on a peer-to-peer basis. All I am saying is that we should be able to opt for a self-service option whenever we like or when banks are failing to include us. This is the same service-versus-application dichotomy which has played out between telecoms providers and Skype to such advantage to end-users.

We are a long ways from being able to implement this sort of solution, from a technical, regulatory and customer acceptance point of view. But shouldn't these issues be at the heart of the ongoing financial architecture debate? We need to think of financial systems much more as a seamless fabric and less as a restricted collection of connected institutions.

Continue reading here:
Why you Should Care about Bitcoin Even if you don't ...

Both chambers of Congress now have a version of a dangerous anti-encryption bill – The Daily Dot

A companion bill to an anti-encryption bill that has been called dangerous by privacy advocates was introduced in the House of Representatives on Thursday.

Rep. Ann Wagner (R-Mo.) introduced the House version of the Lawful Access to Encrypted Data Act on Thursday. A Senate version of the bill was introduced in late June by Sen. Lindsey Graham (R-S.C.), Sen. Tom Cotton (R-Ark.), and Sen. Marsha Blackburn (R-Tenn.).

The bill purports to want to stop warrant-proof encryption to help law enforcement access encrypted data. It would specifically require device manufacturers and service providers to assist law enforcement with accessing encrypted data if assistance would aid in the execution of the warrant, according to a background of the bill.

Almost immediately, the Senate version of the bill faced intense backlash from privacy and civil liberties advocates and marked another notch in the encryption battle that has gone on for years.

Like the Senate version, Wagners House companion bill garnered the enthusiastic backing of Attorney General William Barr, who has long argued for law enforcement to have a back door into encryption.

Numerous advocates have called out the Lawful Access to Encrypted Data Act as misguided, and dangerous. Critics of the bill argue that creating a back door into encryption for law enforcement opens the door for bad actors to similarly find a way in.

The Lawful Access to Encrypted Data Act isnt the only bill in Congress drawing scorn from encryption advocates.

The EARN IT Act, a bill that was amended and passed through a Senate committee earlier this month, has been criticized as a potential threat to encryption. Lawmakers on both sides of the aisle have asserted that the bill aims to curb child exploration online.

The bill would now subject tech companies to a host of state-level laws and potential lawsuits if they use encryption, advocates have warned. Nearly 600,000 people have signed a petition calling on members of Congress to reject it.

READ MORE:

*First Published: Jul 31, 2020, 8:52 am

Andrew Wyrich is the deputy tech editor at the Daily Dot. Andrew has written for USA Today, NorthJersey.com, and other newspapers and websites. His work has been recognized by the Society of the Silurians, Investigative Reporters & Editors (IRE), and the Society of Professional Journalists (SPJ).

Read this article:
Both chambers of Congress now have a version of a dangerous anti-encryption bill - The Daily Dot

The finance jobs immune to COVID-19 – eFinancialCareers

If there's a candidate with a skillset that can be sold into multiple employers in multiple sectors in late 2020, irrespective of COVID-19, it is the person with an elite education in data science and proven experience of extracting monetizable insights from real world datasets. As a recruiter, if you can find one, it is tantamount to hitting the jackpot. Asa candidate who fits this description, you have the pick of employers.

"Data scientists are everywhere in finance," says Natalie Basiratpour. "Not just in the front office supporting trading and research, but across areas like HR too. Data is created for every single decision that's made in the world and data scientists are needed to analyze that."

Not all data scientists are made the same. The latest data science salary survey from recruitment firm Harnham puts entry level data science salaries as low as46k in the U.K. and $110k (for a data engineer) in the U.S.. By comparison, hedge funds can pay salaries as high as $200k - but only for alpha generating data scientists at the top of their field.

Some of the most desirable data science jobs in finance are in artificial intelligence. JPMorgan in particular continues to hire in London, New York and the Bay area for its AI research team focused on cryptography and broaderfinance. Goldman Sachs founded an AI research and development team under chief data officer Neema Raphael in 2017 and runs a parallel AI research team under MD Jeremy Glick.Raphael, who is charged with building Goldman's data lake, is hiring.

Private equity firms are also in the game. Apax Partners, for example, recently poachedAngelique Augereau, head of data science for treasury services at JPMorgan to be its first ever chief data science and analytics officer. Augereau, who will presumably be building a team at Apax, says she's tasked withadvising the fund'sportfolio of around 50 mid cap companies on their,"data and analytics journey." Rival funds, like Cerberus, have been on a similar journey for years already and have hired heavily from banks to staff their datateams.

The flurry of data recruitment in finance has been accompanied by strong demand for data scientists inthe consumer, tech, and consulting sectorstoo. Desirablecandidates have ample opportunities for productive job hopping as a result. Daniel Lin, a former JPMorgan derivatives trader who left take a Masters degree in computational statistics, has worked for three different employers since 2017 in increasingly senior roles.Basiratpour says the most desirable data scientists are at Google or Microsoft, and are almost impossible to move.

Oliver Blaydon, the head of advanced analytics and risk recruitment at search firm Armstrong International, says there's an inevitability to data science recruitment thatmeans it's likely to remain robust throughout 2021. "It's one of the busiest parts of the market," says Blaydon. "Any bank or fund that has a hiring freeze will usually still be open to hiring in roles that involve data."

Have a confidential story, tip, or comment youd like to share? Contact: sbutcher@efinancialcareers.com in the first instance. Whatsapp/Signal/Telegram also available. Bear with us if you leave a comment at the bottom of this article: all our comments are moderated by human beings. Sometimes these humans might be asleep, or away from their desks, so it may take a while for your comment to appear. Eventually it will unless its offensive or libelous (in which case it wont.)

Photo by Markus Spiske on Unsplash

See the article here:
The finance jobs immune to COVID-19 - eFinancialCareers

WEI Art Collections Unveils New Multi-Million Dollar Contemporary Art Collection Commemorating Bitcoin and Ethereum – Benzinga

DUBAI, United Arab Emirates, Aug. 06, 2020 (GLOBE NEWSWIRE) -- WEI Art Collections(https://weiartcollections.art) has stayed true to the meaning of their name with a new art collection. WEI means extraordinary and WEI Art Collections is again set to excite the creative industry with their latest multi-million-dollar contemporary private art collection to celebrate blockchain technology. The new series is an unprecedented fusion of crypto-currency and art.

WEI Art Collectionshas carved a niche for creating the finest, most extraordinary abstract, contemporary, and crypto art. With a team of talented and well-respected artists from different parts of the world, representing numerous cultural, ethnic, and racially diverse creative talent, the platform has provided art collectors as well as corporate and technology leaders with an opportunity to acquire exclusive works of art from the WEI Art Collections series.

The WEI Art Collections Innovation Series are specifically put together for crypto-currency whales, art buyers, and advocates of the blockchain technology. The series also has its obvious appeal to professionals in the financial sector. The latest collection is coming at the most ideal time, with the world rapidly embracing the features and benefits of crypto-currency and blockchain technology.

In the fall of 2018, Adam Lindemann stated in an article in Bloomberg news byKatya Kazakina(https://bloom.bg/3eYwpla ) on November 29 as follows: "Everyone is talking about blockchain, but no one really understands it." Adam is a billionaire and abstract contemporary art collector, amongst the world's leading art collectors. He noted, "This is the right time to think about art and tech."

As the mp3 file undeniably influenced and redefined how the world listens to music, blockchain technology is about to be applied in numerous industries. The use of crypto-currency has become increasingly popular in recent times, with experts predicting growth to the tune of tens of trillions of dollars in the near future. The International Monetary Fund has also substantiated the claim, commenting on the advantages, stability crypto-currency values will enjoy as world economies, and fiat currencies continue to falter. However, the creative industry has been seemingly silent on the subject of crypto-currency and this is where WEI Art Collections is looking to change the narrative with the WEI Art Collections Innovation Series.

WEI Art Collections initially features the top three of the most prominent crypto-currencies destined for global dominance in the blockchain, global banking, and financial industries. There is also the Innovation Series 21 featuring 21 unique works, developed exclusively featuring Bitcoin. The series is developed in commemoration of Bitcoins issuance of 21 million coins. WEI Art Collections exemplifies the pinnacle of the crypto-art medium, engaging and employing emerging artists directly.

The mission of WEI Art Collections is to be amongst the premier contemporary abstract and cryptography art designers/producers/collectors, featuring works that celebrate the bourgeoning field of Cryptography through the new world technology of blockchain digital assets. Owning an exclusive work from the WEI Art Collections Series will also serve as an investment that will go down in history and appreciate over time. For more information please visithttps:/weiartcollections.art/

Media contactCompany: WEI Art CollectionsContact: Jean MarquetteE-mail:info@weiartcollections.artWebsite:https://weiartcollections.art

See the original post:
WEI Art Collections Unveils New Multi-Million Dollar Contemporary Art Collection Commemorating Bitcoin and Ethereum - Benzinga

3 Daunting Ways Artificial Intelligence Will Transform The World Of Work – Forbes

Each industrial revolution has brought with it new ways of working think of the impact computers and digital technology (the third industrial revolution) have had on how we work.

3 Daunting Ways AI Will Transform The World Of Work

But this fourth industrial revolution what I call the intelligence revolution, because it is being driven by AI and data feels unprecedented in terms of the sheer pace of change. The crucial difference between this and the previous industrial revolutions is were no longer talking about generational change; were talking about enormous transformations that are going to take place within the next five, 10 or 20 years.

Here are the three biggest ways I see AI fundamentally changing the work that humans do, within a very short space of time.

1. More tasks and roles will become automated

Increasing automation is an obvious place to start since a common narrative surrounding AI is robots are going to take all our jobs. In many ways, this narrative is completely understandable in a lot of industries and jobs, the impact of automation will be keenly felt.

To understand the impact of automation, PricewaterhouseCoopers analyzed more than 200,000 jobs in 29 countries and found:

By the early 2020s, 3 percent of jobs will be at risk of automation.

That rises to almost 20 percent by the late 2020s.

By the mid-2030s, 30 percent of jobs will be at the potential risk of automation. For workers with low education, this rises to 44 percent.

These are stark figures. But there is a positive side to increasing automation. The same study found that, while automation will no doubt displace many existing jobs, it will also generate demand for new jobs. In fact, AI, robotics, and automation could provide a potential $15 trillion boost to global GDP by 2030.

This is borne out by previous industrial revolutions, which ultimately created more jobs than they displaced. Consider the rise of the internet as an example. Sure, the internet had a negative impact on some jobs (I dont know about you but I now routinely book flights and hotels online, instead of popping to my local travel agent), but just look at how many jobs the internet has created and how its enabled businesses to branch into new markets and reach new customers.

Automation will also lead to better jobs for humans. If were honest with ourselves, the tasks that are most likely to be automated by AI are not the tasks best suited to humans or the tasks that humans should even want to do. Machines are great at automating the boring, mundane, and repetitive stuff, leaving humans to focus on more creative, empathetic, and interpersonal work. Which brings me to

2. Human jobs will change

When parts of jobs are automated by machines, that frees up humans for work that is generally more creative and people-oriented, requiring skills such as problem-solving, empathy, listening, communication, interpretation, and collaboration all skills that humans are generally better at than machines. In other words, the jobs of the future will focus more and more on the human element and soft skills.

According to Deloitte, this will lead to new categories of work:

Standard jobs:Generally focusing on repeatable tasks and standardized processes, standard jobs use a specified and narrow skill set.

Hybrid jobs:These roles require a combination of technical and soft skills which traditionally havent been combined in the same job.

Superjobs:These are roles that combine work and responsibilities from multiple traditional jobs, where technology is used to both augment and widen the scope of the work, involving a more complex combination of technical and human skills.

For me, this emphasizes how employees and organizations will need to develop both the technical and softer human skills to succeed in the age of AI.

3. The employee experience will change, too

Even in seemingly non-tech companies (if there is such a thing in the future), the employee experience will change dramatically. For one thing, robots and cobots will have an increasing presence in many workplaces, particularly in manufacturing and warehousing environments.

But even in office environments, workers will have to get used to AI tools as co-workers. From how people are recruited, to how they learn and develop in the job, to their everyday working activities, AI technology and smart machines will play an increasingly prominent role in the average person's working life. Just as we've all got used to tools like email, we'll also get used to routinely using tools that monitor workflows and processes and make intelligent suggestions about how things could be done more efficiently. Tools will emerge to carry out more and more repetitive admin tasks, such as arranging meetings and managing a diary. And, very likely, new tools will monitor how employees are working and flag up when someone is having trouble with a task or not following procedures correctly.

On top of this, workforces will become decentralized (a trend likely to be accelerated by the coronavirus pandemic) which means the workers of the future can choose to live anywhere, rather than going where the work is.

Preparing for the AI revolution

AI, and particularly automation, is going to transform the way we work. But rather than fear this development, we should embrace this new way of working. We should embrace the opportunities AI provides to make work better.

No doubt, this will require something of a cultural shift for organizations just one of the many ways in which organizations will have to adapt for the intelligence revolution. Discover how to prepare your organization for an AI-driven world in my new book, The Intelligence Revolution: Transforming Your Business With AI.

See the original post:
3 Daunting Ways Artificial Intelligence Will Transform The World Of Work - Forbes

How machine learning and artificial intelligence can drive clinical innovation – PharmaLive

By:

Dr. Basheer Hawwash, Principal Data Scientist

Amanda Coogan, Risk-Based Monitoring Senior Product Manager

Rhonda Roberts, Senior Data Scientist

Remarque Systems Inc.

Everyone knows the terms machine learning and artificial intelligence. Few can define them, much less explain their inestimable value to clinical trials. So, its not surprising that, despite their ability to minimize risk, improve safety, condense timelines, and save costs, these technology tools are not widely used by the clinical trial industry.

Basheer Hawwash

There are lots of reasons for resistance: It seems complicated. Those who are not statistically savvy may find the thought of algorithms overwhelming. Adopting new technology requires a change in the status quo.

Yet, there are more compelling reasons for adoption especially as the global pandemic has accelerated a trend toward patient-centricity and decentralized trials, and an accompanying need for remote monitoring.

Machine learning vs. artificial intelligence. Whats the difference?

Lets start by understanding what the two terms mean. While many people seem to use them interchangeably, they are distinct: machine learning can be used independently or to inform artificial intelligence; artificial intelligence cannot happen without machine learning.

Machine learning is a series of algorithms that analyze data in various ways. These algorithms search for patterns and trends, which can then be used to make more informed decisions. Supervised machine learning starts with a specific type of data for instance, a particular adverse event. By analyzing the records of all the patients who have had that specific adverse event, the algorithm can predict whether a new patient is also likely to suffer from it. Conversely, unsupervised machine learning applies analysis such as clustering to a group of data; the algorithm sorts the data into groups which researchers can then examine more closely to discern similarities they may not have considered previously.

In either case, artificial intelligence applies those data insights to mimic human problem-solving behavior. Speech recognition, self-driving cars, even forms that auto-populate all exist because of artificial intelligence. In each case, it is the vast amounts of data that have been ingested and analyzed by machine learning that make the artificial intelligence application possible.

Physicians, for instance, can use a combination of machine learning and artificial intelligence to enhance diagnostic abilities. In this way, given a set of data, machine learning tools can analyze images to find patterns of chronic obstructive pulmonary disease (COPD); artificial intelligence may be able to further identify that some patients have idiopathic pulmonary fibrosis (IPF) as well as COPD, something their physicians may neither have thought to look for, nor found unaided.

Amanda Coogan

Now, researchers are harnessing both machine learning and artificial intelligence in their clinical trial work, introducing new efficiencies while enhancing patient safety and trial outcomes.

The case of the missing data

Data is at the core of every clinical trial. If those data are not complete, then researchers are proceeding on false assumptions, which can jeopardize patient safety and even the entire trial.

Traditionally, researchers have guarded against this possibility by doing painstaking manual verification, examining every data point in the electronic data capture system to ensure that it is both accurate and complete. More automated systems may provide reports that researchers can look through but that still requires a lot of human involvement. The reports are static and must be reviewed on an ongoing basis and every review has the potential for human error.

Using machine learning, this process happens continually in the background throughout the trial, automatically notifying researchers when data are missing. This can make a material difference in a trials management and outcomes.

Consider, if you will, a study in which patients are tested for a specific metric every two weeks. Six weeks into the study, 95 percent of the patients show a value for that metric; 5 percent dont. Those values are missing. The system will alert researchers, enabling them to act promptly to remedy the situation. They may be able to contact the patients in the 5 percent and get their values, or they may need to adjust those patients out of the study. The choice is left to the research team but because they have the information in near-real time, they have a choice.

As clinical trials move to new models, with greater decentralization and greater reliance on patient-reported data, missing data may become a larger issue. To counteract that possibility, researchers will need to move away from manual methods and embrace both the ease and accuracy of machine-learning-based systems.

The importance of the outlier

In research studies, not every patient nor even every site reacts the same way. There are patients whose vital signs are off the charts. Sites with results that are too perfect. Outliers.

Rhonda Roberts

Often researchers discover these anomalies deep into the trial, during the process of cleaning the data in preparation for regulatory submission. That may be too late for a patient who is having a serious reaction to a study drug. It also may mean that the patients data are not valid and cannot be included in the end analysis. Caught earlier, there would be the possibility of a course correction. The patient might have been able to stay in the study, to continue to provide data; alternatively, they could be removed promptly along with their associated data.

Again, machine learning simplifies the process. By running an algorithm that continually searches for outliers, those irregularities are instantly identified. Researchers can then quickly drill down to ascertain whether there is an issue and, if so, determine an appropriate response.

Of course, an anomaly doesnt necessarily flag a safety issue. In a recent case, one of the primary endpoints involved a six-minute walk test. One site showed strikingly different results; as it happened, they were using a different measurement gauge, something that would have skewed the study results, but, having been flagged, was easily modified.

In another case, all the patients at a site were rated with maximum quality of life scores and all their blood pressure readings were whole numbers. Machine learning algorithms flagged these results because they varied dramatically from the readings at the other sites. On examination, researchers found that the site was submitting fraudulent reports. While that was disturbing to learn, the knowledge gave the trial team power to act, before the entire study was rendered invalid.

A changing landscape demands a changing approach

As quality management is increasingly focusing on risk-based strategies, harnessing machine learning algorithms simplifies and strengthens the process. Setting parameters based on study endpoints and study-specific risks, machine learning systems can run in the background throughout a study, providing alerts and triggers to help researchers avoid risks.

The need for such risk-based monitoring has accelerated in response to the COVID-19 pandemic. With both researchers and patients unable or unwilling to visit sites, studies have rapidly become decentralized. This has coincided with the emergence and growing importance of patient-centricity and further propelled the rise of remote monitoring. Processes are being forced online. Manual methods are increasingly insufficient and automated methods that incorporate machine learning and artificial intelligence are gaining primacy.

Marrying in-depth statistical thinking with critical analysis

The trend towards electronic systems does not replace either the need for or the value of clinical trial monitors and other research personnel; they are simply able to do their jobs more effectively. A machine-learning-based system runs unique algorithms, each analyzing data in a different way to produce visualizations, alerts, or workflows, which CROs and sponsors can use to improve patient safety and trial efficiency. Each algorithm is tailored to the specific trial, keyed to endpoints, known risks, or other relevant factors. While the algorithms offer guidance, the platform does not make any changes to the data or the trial process; it merely alerts researchers to examine the data and determine whether a flagged value is clinically significant. Trial personnel are relieved of much tedious, reproducible, manual work, and are able to use their qualifications to advance the trial in other meaningful ways.

The imperative to embrace change

Machine learning and artificial intelligence have long been buzzwords in the clinical trial industry yet these technologies have only haltingly been put to use. Its time for that pendulum to swing. We can move more quickly and more precisely than manual data verification, and data cleaning allow. We can work more efficiently if we harness data to drive trial performance rather than simply to prove that the study endpoints were achieved. We can operate more safely if we are programmed for risk management from the outset. All this can be achieved easily, with the application of machine learning and artificial intelligence. Now is the time to move forward.

See original here:
How machine learning and artificial intelligence can drive clinical innovation - PharmaLive

Ted Hearne – Daily Beast

TED HEARNE (b.1982, Chicago) is a composer, singer, bandleader and recording artist. He creates multi-dimensional works that are challenging, personal and reflective of the questions we face in the world today.

Pitchfork called Hearne's work "some of the most expressive socially engaged music in recent memory -- from any genre," and Alex Ross wrote in The New Yorker that Hearne's music "holds up as a complex mirror image of an information-saturated, mass-surveillance world, and remains staggering in its impact." Hearne's Sound From the Bench, a work for choir, electric guitars and drums about corporate personhood setting texts from U.S. Supreme Court oral arguments, was a finalist for the 2018 Pulitzer Prize.

Teds ongoing collaboration with legendary musician Erykah Badu pairs new music with arrangements of Badus works for orchestra, most recently presented with the Dallas Symphony Orchestra. His album The Source sets the words of former U.S. Army Private Chelsea Manning alongside classified documents from U.S. Dept of Defense cables that she was responsible for leaking to Julian Assange and WikiLeaks. The New York Times called The Source "a 21st Century masterpiece.

Upcoming collaborations include a new work with poet Dorothea Lasky and director Daniel Fish to be presented at Carnegie Hall, and a new orchestral project with performance artist and singer-songwriter Taylor Mac. Place, written with poet Saul Williams and director Patricia McGregor, is Hearnes latest album, released in 2020 on New Amsterdam Records. For more visit: http://www.tedhearne.com

Follow this link:
Ted Hearne - Daily Beast