Will Artificial Intelligence Kill College Writing? – The Chronicle of Higher Education

When I was a kid, my favorite poem was Shel Silversteins The Homework Machine, which summed up my childhood fantasy: a machine that could do my homework at the press of a button. Decades later that technology, the innocuously titled GPT-3, has arrived. It threatens many aspects of university education above all, college writing.

The web-based GPT-3 software program, which was developed by an Elon Musk-backed nonprofit called OpenAI, is a kind of omniscient Siri or Alexa that can turn any prompt into prose. You type in a query say, a list of ingredients (what can I make with eggs, garlic, mushrooms, butter, and feta cheese?) or a genre and prompt (write an inspiring TED Talk on the ways in which authentic leaders can change the world) and GPT-3 spits out a written response. These outputs can be astonishingly specific and tailored. When asked to write a song protesting inhumane treatment of animals in the style of Bob Dylan, the program clearly draws on themes from Dylans Blowin in the Wind:

How many more creatures must suffer?How many more must die?Before we open up our eyesAnd see the harm were causing?

When asked to treat the same issue in the style of Shakespeare, it produces stanzas of iambic tetrameter in appropriately archaic English:

By all the gods that guide this EarthBy all the stars that fill the skyI swear to end this wretched dearthThis blight of blood and butchery.

GPT-3 can write essays, op-eds, Tweets, jokes (admittedly just dad jokes for now), dialogue, advertisements, text messages, and restaurant reviews, to give just a few examples. Each time you click the submit button, the machine learning algorithm pulls from the wisdom of the entire internet and generates a unique output, so that no two end products are the same.

The quality of GPT-3s writing is often striking. I asked the AI to discuss how free speech threatens a dictatorship, by drawing on free speech battles in China and Russia and how these relate to the First Amendment of the U.S. Constitution. The resulting text begins, Free speech is vital to the success of any democracy, but it can also be a thorn in the side of autocrats who seek to control the flow of information and quash dissent. Impressive.

From an essay written by the GPT-3 software program

The current iteration of GPT-3 has its quirks and limitations, to be sure. Most notably, it will write absolutely anything. It will generate a full essay on how George Washington invented the internet or an eerily informed response to 10 steps a serial killer can take to get away with murder. In addition, it stumbles over complex writing tasks. It cannot craft a novel or even a decent short story. Its attempts at scholarly writing I asked it to generate an article on social-role theory and negotiation outcomes are laughable. But how long before the capability is there? Six months ago, GPT-3 struggled with rudimentary queries, and today it can write a reasonable blog post discussing ways an employee can get a promotion from a reluctant boss.

Since the output of every inquiry is original, GPT-3s products cannot be detected by anti-plagiarism software. Anyone can create an account for GPT-3. Each inquiry comes at a cost, but its usually less than a penny and the turnaround is instantaneous. Hiring someone to write a college-level essay, in contrast, currently costs $15 to $35 per page. The near-free price point of GPT-3 is likely to entice many students who would otherwise be priced out of essay-writing services.

It wont be long before GPT-3, and the inevitable copycats, infiltrate the university. The technology is just too good and too cheap not to make its way into the hands of students who would prefer not to spend an evening perfecting the essay I routinely assign on the leadership style of Elon Musk. Ironic that he has bankrolled the technology that makes this evasion possible.

To help me think through what the collision of AI and higher ed might entail, I naturally asked GPT-3 to write an op-ed exploring the ramifications of GPT-3 threatening the integrity of college essays. GPT-3 noted, with mechanical unself-consciousness, that it threatened to undermine the value of a college education. If anyone can produce a high-quality essay using an AI system, it continued, then whats the point of spending four years (and often a lot of money) getting a degree? College degrees would become little more than pieces of paper if they can be easily replicated by machines.

The effects on college students themselves, the algorithm wrote, would be mixed: On the positive side, students would be able to focus on other aspects of their studies and would not have to spend time worrying about writing essays. On the negative side, however, they will not be able to communicate effectively and will have trouble in their future careers. Here GPT-3 may actually be understating the threat to writing: Given the rapid development of AI, what percent of college freshmen today will have jobs that require writing at all by the time they graduate? Some who would once have pursued writing-focused careers will find themselves instead managing the inputs and outputs of AI. And once AI can automate that, even those employees may become redundant. In this new world, the argument for writing as a practical necessity looks decidedly weaker. Even business schools may soon take a liberal-arts approach, framing writing not as career prep but as the foundation of a rich and meaningful life.

So what is a college professor to do? I put the question to GPT-3, which acknowledged that there is no easy answer to this question. Still, I think we can take some sensible measures to reduce the use of GPT-3 or at least push back the clock on its adoption by students. Professors can require students to draw on in-class material in their essays, and to revise their work in response to instructor feedback. We can insist that students cite their sources fully and accurately (something that GPT-3 currently cant do well). We can ask students to produce work in forms that AI cannot (yet) effectively create, such as podcasts, PowerPoints, and verbal presentations. And we can design writing prompts that GPT-3 wont be able to effectively address, such as those that focus on local or university-specific challenges that are not widely discussed online. If necessary, we could even require students to write assignments in an offline, proctored computer lab.

Eventually, we might enter the if you cant beat em, join em phase, in which professors ask students to use AI as a tool and assess their ability to analyze and improve the output. (I am currently experimenting with a minor assignment along these lines.) A recent project on Beethovens 10th symphony suggests how such projects might work. When he died, Beethoven had composed only 5 percent of his 10th symphony. A handful of Beethoven scholars fed the short, completed section into an AI that generated thousands of potential versions of the rest of the symphony. The scholars then sifted through the AI-generated material, identified the best parts, and pieced them together to create a complete symphony. To my somewhat limited ear, it sounds just like Beethoven.

See the original post:
Will Artificial Intelligence Kill College Writing? - The Chronicle of Higher Education

Artificial intelligence to recognise weather conditions – Kathorus Mail

Researchers at Oxford Universitys Department of Computer Science, in collaboration with colleagues from the Bogazici University, Turkey, have developed a novel artificial intelligence (AI) system.

Yasin Almalioglu, who completed the research as part of his DPhil in the Department of Computer Science, said, The difficulty for AVs to achieve precise positioning during challenging adverse weather is a major reason why these have been limited to relatively small-scale trials up to now. For instance, weather such as rain or snow may cause an AV to detect itself in the wrong lane before a turn, or to stop too late at an intersection because of imprecise positioning.

To overcome this problem, Almalioglu and his colleagues developed a novel, self-supervised deep learning model for ego-motion estimation, a crucial component of an AVs driving system that estimates the cars moving position relative to objects observed from the car itself. The model brought together richly detailed information from visual sensors (which can be disrupted by adverse conditions) with data from weather-immune sources (such as radar), so that the benefits of each can be used under different weather conditions.

The model was trained using several publicly available AV datasets, which included data from multiple sensors such as cameras, lidar and radar under diverse settings, including variable light/darkness levels and precipitation. These were used to generate algorithms to reconstruct scene geometry and calculate the cars position from novel data. Under various test situations, the researchers demonstrated that the model showed robust all-weather performance, including conditions of rain, fog and snow, as well as day and night.

The team anticipates that this work will bring AVs one step closer to safe and smooth all-weather autonomous driving, and ultimately a broader use within societies.

The full paper, Deep learning-based robust positioning for all-weather autonomous driving, is published inNature Machine Intelligence. This will be published online at the following link once the embargo lifts:https://www.nature.com/articles/s42256-022-00520-5.

Source: University of Oxford

Go here to see the original:
Artificial intelligence to recognise weather conditions - Kathorus Mail

The Technion Is Number One In Europe In Artificial Intelligence – NoCamels – Israeli Innovation News

The Technion-Israel Institute of Technology has been named Europes top university for artificial intelligence by CSRankings, which ranks top computer science institutions around the world. It is the second year in a row that the web app has ranked it in first place.

The University also placed 16th in the world in AI, and 10th in the world in the subfield of learning systems.

The Technion recruits researchers and students from all of its departments to promote interdisciplinary AI research, which has increased the number of new programs and initiatives in various fields with leading companies and top universities and research institutions around the world.

It is also establishing its own AI community to empower its student body and researchers working in all fields of artificial intelligence, which will deepen the Technions many collaborations with industry and academia in these fields.

Around 150 Technion researchers are currently involved in Tech.AI, the Technions Center for Artificial Intelligence. Tech.AI researchers apply advanced methodologies and tools at the forefront of artificial intelligence in a variety of fields including data science, medical research, mechanical engineering, civil engineering, architecture, and biology.

The Tech.AI center brings together all of the Technions biomed activity in the field of AI and positions it in a dominant place in the world, with extensive partnerships with leading companies such as Pfizer and IBM and leading medical institutions in Israel and the world, including the Rambam Health Care Campus and the Cincinnati Childrens Hospital Medical Center, said Prof Shai Shen-Orr from the Technions Rappaport Faculty of Medicine.

Prof Shie Mannor from the Faculty of Electrical and Computer Engineering said: The Technion continues to establish its position as the leading research institution in Israel and Europe in the core areas of artificial intelligence, thanks to the unique work environment that exists in this field at the Technion,

This environment currently comprises about 150 researchers from a variety of faculties, research centers with extensive activity, and a growing number of study programs in the field and research initiatives and programs that are the result of collaborations between the Technion and the leading companies and organizations in Israel and the world.

Professor Assaf Shuster from the Faculty of Computer Science said: Solidifying the Technions position as a pioneer and world leader in the field of AI and spreading the knowledge acquired in this process to the commercial world in all its aspects, are very important national tasks.

Tech.AI operates around the clock and through a variety of channels and activities to deepen Technion education that promotes AI research and its application in all faculties and research centers and to provide students and researchers dealing in all AI fields with the most supportive environment.

See the original post here:
The Technion Is Number One In Europe In Artificial Intelligence - NoCamels - Israeli Innovation News

Distracted drivers are being identified by artificial intelligence in Edmonton – The Gateway Online

Artificial intelligence is currently being used in Edmonton to detect distracted driving as part of a research project.

On September 13, the University of Alberta launched this three-week research project to understand the prevalence of distracted drivers, specifically in Edmonton. Karim El-Basyouny, a professor in the faculty of engineering and urban traffic safety research chair at the University of Alberta, is the lead of the research team. The U of A research is in a collaboration with Acusensus, the City of Edmonton, and the Edmonton Police Service.

Since September 13, the technology has been stationed at its first location on the intersection of 79 Street and Argyll Road. According to El-Basyouny, it will be stationed there for about a week before moving to the next location, which is currently unknown. There will be a total of three different locations, one for each week during this project.

El-Basyounys research is being supported by a seed grant, making the use of Acusensus technology possible. Although the Edmonton Police Service is in collaboration with this project, the collection of data will be used solely for research, not traffic enforcement.

Edmonton is the first city in Canada to test Acusensus technology, according to Tony Parrino, the general manager for Acusensus in North America.

The data around distracted driving in Canada has been a little patchy, [and] we dont really understand how big of a problem it is what were trying to do is see if there is a better way of understanding how big of an issue [distracted driving] is, El-Basyouny explained.

The technology being used to determine the prevalence of distracted drivers is mainly AI. According to Parrino, the AI has gone through a number of training scenarios with millions of data points.

The system is radar-based with many different sensors, and four different cameras. Each camera captures something different; one captures a steep shot of the windshield, one camera is shallow in case of a phone-to-ear event, and the other two cameras are used for color context and capturing license plates. The information gathered is then given to the AI.

According to Parrino, although the AI has been trained to have maximum accuracy there is a possibility for false positives.

It is very accurate, but there are false positives 100 per cent of the images that are captured are reviewed by trained individuals [who determine if] the criteria is met for the U of A to determine that a distracted driving event has occurred, and only those are counted, Parrino said.

Although Acusensus technology is being used in Australia for traffic enforcement, according to Parrino, it is unknown if the technology will be used for traffic enforcement in Edmonton. As of right now, this research is being used solely to see the prevalence of distracted drivers in Edmonton.

I think [traffic enforcement] is an option that is available to us at [some] point in the future, [however] it is not predominantly the purpose of this study, El-Basyouny said.

In a statement sent out September 13, Jessica Lamarre, director of Safe Mobility for the City of Edmonton, commented on the U of A research project.

This project provides an opportunity to gain a better understanding of the prevalence and safety impacts of distracted driving on our streets through the creative use of new technology alongside our talented research partners at the University of Alberta.

View post:
Distracted drivers are being identified by artificial intelligence in Edmonton - The Gateway Online

What is Encryption? Definition, Types & Benefits | Fortinet

Encryption is a form of data security in which information is converted to ciphertext. Only authorized people who have the key can decipher the code and access the original plaintext information.

In even simpler terms, encryption is a way to render data unreadable to an unauthorized party. This serves to thwart cybercriminals, who may have used quite sophisticated means to gain access to a corporate networkonly to find out that the data is unreadable and therefore useless.

Encryption not only ensures the confidentiality of data or messages but it also provides authentication and integrity, proving that the underlying data or messages have not been altered in any way from their original state.

Original information, or plain text, might be something as simple as "Hello, world!" As cipher text, this might appear as something confusing like 7*#0+gvU2xsomething seemingly random or unrelated to the original plaintext.

Encryption, however, is a logical process, whereby the party receiving the encrypted databut also in possession of the keycan simply decrypt the data and turn it back into plaintext.

For decades, attackers have tried by brute forceessentially, by trying over and over againto figure out such keys. Cybercriminals increasingly have access to stronger computing power such that sometimes, when vulnerabilities exist, they are able to gain access.

Data needs to be encrypted when it is in two different states: "at rest," when it is stored, such as in a database; or "in transit," while it is being accessed or transmitted between parties.

An encryption algorithm is a mathematical formula used to transform plaintext (data) into ciphertext. An algorithm will use the key to alter the data in a predictable way. Even though the encrypted data appears to be random, it can actually be turned back into plaintext by using the key again. Some commonly used encryption algorithms includeBlowfish, Advanced Encryption Standard (AES), Rivest Cipher 4 (RC4), RC5, RC6, Data Encryption Standard (DES), and Twofish.

Encryption has evolved over time, from a protocol that was used only by governments for top-secret operations to an everyday must-have for organizations to ensure the security and privacy of their data.

Read more here:
What is Encryption? Definition, Types & Benefits | Fortinet

Encryption | CISA

Encryption ensures effective security where information cannot be intercepted and used to hinder emergency response or endanger responders and the public. The public safety community increasingly needs to protect critical information and sensitive data, particularly within land mobile radio (LMR) communications, and encryption is the best available tool to achieve that security. The resources below provide best practices and considerations for planning, implementing, and securely operating encryption with public safety communications.

Encryption in Three Minutes VideoDrawn from interviews with emergency communications practitioners nationwide, Encryption in Three Minutes presents an overview of LMR encryption in public safety operations. The video outlines encryptions role in protecting sensitive tactical and operational communications as well as the personal identifiable information and medical status of civilian patients during emergencies. Discussion focuses on implementing a practical, reliable encryption system while preserving interoperability with mutual aid partners and outside agencies. Special attention is given to selecting the most secure encryption algorithm. It is an ideal brief overview of LMR encryption aimed at community leaders and public safety administrators, officials, and responders.

Guidelines for Encryption in Land Mobile Radio SystemsAs a result from a number of security risk and vulnerability assessments, the public safety community has recognized the increasing effort to protect sensitive information transmitted over its wireless communications systems. The purpose of this document is to provide information that should be considered when evaluating encryption solutions to minimize the possibility of sensitive information being monitored, but are concerned with the cost of standards compliant encryption.

Best Practices for Encryption in P25 Public Safety Land Mobile Radio SystemsThis document addresses methods to improve cross-agency coordination and emphasizes the use of standards-based encryption to enhance secure interoperability and minimize the risk of compromising sensitive information.

Best Practices for Encryption in P25 Public Safety Land Mobile Radio Systems - Developing Methods to Improve Encrypted Interoperability in Public Safety (Fact Sheet)This document highlights best practices of key management necessary to allow encrypted operability and interoperability. These best practices are important in developing system security where encrypted interoperability is realizable. Additionally, significant planning and coordination must be undertaken to achieve encrypted interoperability on a national scale.

Considerations for Encryption in Public Safety Radio SystemsThis document examines the complex issues of why encryption may be needed during critical operations of an urgent or time-sensitive nature or when open communications may not be sufficient to protect personally identifiable and/or sensitive information. This document provides guidance to public safety users through a process to assess the need for encryption as well as the questions that must be considered.

Considerations for Encryption in Public Safety Radio Systems - Determining the Need for Encryption in Public Safety Radios (Fact Sheet)This document provides a high-level overview of all the factors public safety agencies and departments should thoroughly discuss and carefully considered before reaching a decision to encrypt their public safety radio systems.

Encryption Key Management Fact SheetDeveloped by SAFECOM and NCSWIC, in collaboration with the Federal Partnership for Interoperable Communications (FPIC), this fact sheet educates public safety organizations on how to effectively manage cryptographic keys for their radio systems.The ability for unauthorized persons to listen in on confidential and tactical information in radio transmissions has led many of these agencies to encrypt some or all radio transmissions. The document provides an overview of the various considerations for agencies desiring to encrypt their radios; summarizes what is involved in encryption and encryption key management; specifies which types of encryption are safest for use; and outlines why encryption key management is important.

Guidelines for Encryption in Land Mobile Radio Systems - Determining what Encryption Method to Use for Public Safety RadiosThis document discusses methods that may be used to ensure the privacy of sensitive public safety LMR communications. These methods mainly involve the use of a variety of encryption techniques.

Operational Best Practices for Encryption Key ManagementDeveloped by the FPIC, in collaboration with SAFECOM and NCSWIC, this document provides public safety organizations that have chosen to encrypt their radio transmissions with information on how to effectively obtain, distribute, and manage cryptographic keys. The document discusses the various types of encryption, how to obtain encryption keys, how to store them, and why it is important to periodically change encryption keys while still maintaining interoperability with partner agencies. This document, and the accompanying Encryption Key Management Fact Sheet, were published to guide public safety communications professionals on effectively managing encryption keys.

Communications Security Protecting Critical Information, Personnel, and Operations White PaperCommunications Security (COMSEC) is an integrated set of policies, procedures, and technologies for protecting sensitive and confidential information, which, if compromised, could put responders and citizens safety and privacy at risk. This white paper summarizes the threats and draws on established COMSEC principles to describe reliable approaches to secure information. It highlights encryption of message traffic, with special emphasis on maintaining interoperability through careful planning, coordination, and selection of a standard encryption algorithm.

Read the rest here:
Encryption | CISA

Meta, Twitter, Apple, Google urged to up encryption game in post-Roe America – The Register

Facebook, Twitter, Google, Apple, and others today faced renewed pressure to protect the privacy of messaging app users seeking healthcare treatment.

Now that America has entered its post-Roe era, in which more than a dozen states have banned abortion, digital rights advocacy group Fight for the Future has called on tech companies to implement strong on-by-default end-to-end encryption (E2EE) across their messaging services to secure users' communications, and prevent conversations from being shared with police and others.

Crucially, campaigners want to ensure that people's chats discussing procedures outlawed at the state level can't be obtained by the cops and used to build a criminal case against them.

"When our messages are protected from interlopers, we can communicate freely, without the fear of being watched," said Caitlin Seeley George, Fight for the Future's campaigns and managing director, in a statement.

Tech companies are throwing their users to the wolves by allowing company employees, cops, and other third parties to access unprotected messages

"After the reversal of Roe v. Wade and with more rights cutbacks on the way, tech companies are throwing their users to the wolves by allowing company employees, cops, and other third parties to access unprotected messages."

In theory, E2EE should prevent anyone other than the two (or more) people involved in the private conversation from accessing its contents. This means that, for example, if the Facebook chats between a Nebraska teen daughter and her mom about an abortion had instead happened on a service like Signal or Meta's WhatsApp, both of which use E2EE by default, then Meta, even when served with a subpoena to turn over the private conversations, would not have been able to access their contents.

Meta, for its part, has committed to enabling default E2EE on both Messenger and Instagram "sometime in 2023," according to Meta spokesperson Alex Dziedzan.

Right now, customers have the option to enable the optional feature on both services, he added.

"The challenge for us is twofold," Dziedzan told The Register. "It's a technical one as well as a human-rights one."

Meta delivers 160 billion messages everyday across its Messenger, Instagram, and WhatsApp services, he said."Considering the size and scale, we can't afford to create a situation where messages get lost or the system falls down," Dziedzan said.

The second element, he added, addresses human rights. "How do we build end-to-end encryption in a thoughtful, critical manner? Are we building tools with enough safety for people, so they have the ability to block people? It's a massive engineering task it's not just flipping a switch," Dziedzan said.

Massive engineering task is right: Facebook staff aren't even sure where exactly people's data is stored, due to the sprawling distributed nature of the social network, which is used by billions of people every month.

Aside from Meta, none of the other messaging services responded to The Register's inquiries about their plans for E2EE.

This includes Twitter, which hasn't announced plans to implement encryption. This year it emerged that Twitter had suffered a security snafu that exposed Twitter account IDs linked to phone numbers and email addresses of a reported 5.4 million users. And, more recently, its former security boss alleged that about half of Twitter's roughly 10,000 staff have access to live production systems and user data, and that some staff quietly installed spyware on their computers on behalf of foreign intelligence.

Apple also did not respond to The Register's questions. While iMessage texts are end-to-end encrypted by default when sent between iPhones, messages between iPhone and Android devices don't use E2EE.

Google has called on Apple to "fix texting" by adopting Rich Communications Services (RCS), a protocol used by most mobile industry vendors but not the iPhone maker. So far that campaign hasn't worked.

RCS originally did not include E2EE, but Google Messages added support in late 2020; Group messages got E2E encryption this year. Google Chat, however, is not end-to-end encrypted.

Discord, which also does not use E2EE for messaging, did not respond to The Register's unencrypted requests for comments, either.

A Slack spokesperson, in an email to The Register, noted that while not E2EE, it does encrypt data at rest and data in transit.

"We also offer EKM (Enterprise Key Management), a security add-on for Slack Enterprise Grid that allows organizations to manage their own encryption keys using Amazon Key Management Service (KMS)," the spokesperson wrote.

"Slack will not share customer data with government entities or third parties unless we're legally obligated to do so and we make it our practice to challenge any unclear, overbroad, or inappropriate requests."

Go here to read the rest:
Meta, Twitter, Apple, Google urged to up encryption game in post-Roe America - The Register

Spyware and surveillance: Threats to privacy and human rights growing, UN report warns – OHCHR

GENEVA (16 September 2022) Peoples right to privacy is coming under ever greater pressure from the use of modern networked digital technologies whose features make them formidable tools for surveillance, control and oppression, a new UN report has warned. This makes it all the more essential that these technologies are reined in by effective regulation based on international human rights law and standards.

The report the latest on privacy in the digital age by the UN Human Rights Office* looks at three key areas: the abuse of intrusive hacking tools (spyware) by State authorities; the key role of robust encryption methods in protecting human rights online; and the impacts of widespread digital monitoring of public spaces, both offline and online.

The report details how surveillance tools such as the Pegasus software can turn most smartphones into 24-hour surveillance devices, allowing the intruder access not only to everything on our mobiles but also weaponizing them to spy on our lives.

While purportedly being deployed for combating terrorism and crime, such spyware tools have often been used for illegitimate reasons, including to clamp down on critical or dissenting views and on those who express them, including journalists, opposition political figures and human rights defenders, the report states.

Urgent steps are needed to address the spread of spyware, the report flags, reiterating the call for a moratorium on the use and sale of hacking tools until adequate safeguards to protect human rights are in place. Authorities should only electronically intrude on a personal device as a last resort to prevent or investigate a specific act amounting to a serious threat to national security or a specific serious crime, it says.

Encryption is a key enabler of privacy and human rights in the digital space, yet it is being undermined. The report calls on States to avoid taking steps that could weaken encryption, including mandating so-called backdoors that give access to peoples encrypted data or employing systematic screening of peoples devices, known as client-side scanning.

The report also raises the alarm about the growing surveillance of public spaces. Previous practical limitations on the scope of surveillance have been swept away by large-scale automated collection and analysis of data, as well as new digitized identity systems and extensive biometric databases that greatly facilitate the breadth of such surveillance measures.

New technologies have also enabled the systematic monitoring of what people are saying online, including through collecting and analysing social media posts.

Governments often fail to adequately inform the public about their surveillance activities, and even where surveillance tools are initially rolled out for legitimate goals, they can easily be repurposed, often serving ends for which they were not originally intended.

The report emphasises that States should limit public surveillance measures to those strictly necessary and proportionate, focused on specific locations and time. The duration of data storage should similarly be limited. There is also an immediate need to restrict the use of biometric recognition systems in public spaces.

All States should also act immediately to put in place robust export control regimes for surveillance technologies that pose serious risks to human rights. They should also ensure human rights impact assessments are carried out that take into account what the technologies in question are capable of, as well as the situation in the recipient country.

Digital technologies bring enormous benefits to societies. But pervasive surveillance comes at a high cost, undermining rights and choking the development of vibrant, pluralistic democracies, said Acting High Commissioner for Human Rights Nada Al-Nashif.

In short, the right to privacy is more at risk than ever before, she stressed. This is why action is needed and needed now.

See the original post:
Spyware and surveillance: Threats to privacy and human rights growing, UN report warns - OHCHR

Microchip Unveils Industrys First Terabit-Scale Secure Ethernet PHY Family with Port Aggregation for Enterprise and Cloud Interconnect – Yahoo Finance

Microchip Technology Inc.

META-DX2+ enables OEMs to double router and switch system capacities with 112G PAM4 connectivity for 800G ports, adds encryption and Class C/D precision timing

CHANDLER, Ariz., Sept. 19, 2022 (GLOBE NEWSWIRE) -- The demand for increased bandwidth and security in network infrastructure driven by growth in hybrid work and geographical distribution of networks is redefining borderless networking. Led by AI/ML applications, the total port bandwidth for 400G (gigabits per second) and 800G is forecasted to grow at an annual rate of over 50%, according to 650 Group. This dramatic growth is expanding the transition to 112G PAM4 connectivity beyond just cloud data center and telecom service provider switches and routers to enterprise Ethernet switching platforms. Microchip Technology Inc. (NASDAQ: MCHP) is responding to this market inflection with the META-DX2 Ethernet PHY (physical layer) portfolio by introducing a new family of META-DX2+ PHYs. These are the industrys first solution set to integrate 1.6T (terabits per second) of line-rate end-to-end encryption and port aggregation to maintain the most compact footprint in the transition to 112G PAM4 connectivity for enterprise Ethernet switches, security appliances, cloud interconnect routers and optical transport systems.

The introduction of four new META-DX2+ Ethernet PHYs demonstrates our commitment to supporting the industry transition to 112G PAM4 connectivity powered by our META-DX retimer and PHY portfolio. In conjunction with our META-DX2L retimer, we now offer a complete chipset for all connectivity needs from retiming, gearboxing, to advanced PHY functionality, said Babak Samimi, corporate vice president of Microchips communications business unit. By offering both hardware and software footprint compatibility, our customers can leverage architectural designs across their enterprise, data center, and service provider switching and routing systems that can offer pay-as-you-need enablement of advanced features including end-to-end security, multi-rate port aggregation, and precision timestamping via a software subscription model.

The META-DX2+s configurable 1.6T datapath architecture outperforms the next near competitors by 2x in total gearbox capacity and hitless 2:1 protection switch mux modes enabled by its unique ShiftIO capability. The flexible XpandIO port aggregation capabilities optimize router/switch port utilization when supporting low-rate traffic. Also, the devices include IEEE 1588 Class C/D Precision Time Protocol (PTP) support for accurate nanosecond timestamping required for 5G and enterprise business critical services. By offering a portfolio of footprint-compatible retimer and advanced PHYs with encryption options, Microchip enables developers to expand their designs to add MACsec and IPsec based on a common board design and Software Development Kit (SDK).

META-DX2+ differentiated capabilities include:

Dual 800 GbE, quad 400 GbE and 16x 100/50/25/10/1 GbE MAC/PHY

Integrated 1.6T MACsec/IPsec engines that offload encryption from packet processors so systems can more easily scale up to higher bandwidths with end-to-end security

Greater than 20% board savings compared to competing solutions that require two devices to deliver the same 1.6T gearbox and hitless 2:1 mux modes

XpandIO enables port aggregation of low-rate Ethernet clients over higher speed Ethernet interfaces, optimized for enterprise platforms

ShiftIO feature combined with a highly configurable integrated crosspoint enables flexible connectivity between external switches, processors, and optics

Device variants with 48 or 32 Long Reach (LR) capable 112G PAM4 SerDes including programmability to optimize power vs. performance

Support for Ethernet, OTN, Fibre Channel and proprietary data rates for AI/ML applications

As the industry transitions to a 112G PAM4 serial ecosystem for high-density routers and switches, line-rate encryption and efficient use of port capacity becomes increasingly important, said Alan Weckel, founder and technology analyst at 650 Group, LLC. Microchips META-DX2+ family will play an important role in enabling MACsec and IPsec encryption, optimizing port capacity with port aggregation, and flexibly connecting routing/switching silicon to multi-rate 400G and 800G optics.

Like the META-DX2L retimer, the new series of META-DX2+ PHYs can be used with Microchips PolarFire FPGAs, the ZL30632 high-performance PLL, oscillators, voltage regulators, and other components that have been pre-validated as a system to help speed designs into production.

Development Tools

Microchips second-generation Ethernet PHY SDK for the META-DX2 family lowers development costs with field-proven API libraries and firmware. The SDK supports all META-DX2L and META-DX2+ PHY devices within the product family. Support for the Open Compute Project (OCP) Switch Abstraction Interface (SAI) PHY extensions are included to enable agnostic support of the META-DX2 PHYs within a wide range of Network Operating Systems (NOS) that support SAI.

Availability

The META-DX2+ family is expected to sample during the fourth calendar quarter of 2022. For additional information visit the META-DX2+ webpage or contact a Microchip sales representative.

See the META-DX2L Ethernet PHY at ECOC 2022

Microchip will be exhibiting the META-DX2L PHY device, which started sampling in the fourth quarter of 2021, in the Optical Internetworking Forum (OIF) booth at the European Conference on Optical Communication (ECOC) September 18-22, 2022, in Basel Switzerland. Microchip and other OIF members will be showcasing how multi-vendor interoperability is accelerating industry solutions for the global network in booth #701 at the Congress Center Basel.

Resources

High-res images available through Flickr or editorial contact (feel free to publish): Application image: http://www.flickr.com/photos/microchiptechnology/52336953308/sizes/l/

About Microchip Technology

Microchip Technology Inc. is a leading provider of smart, connected and secure embedded control solutions. Its easy-to-use development tools and comprehensive product portfolio enable customers to create optimal designs which reduce risk while lowering total system cost and time to market. The company solutions serve more than 120,000 customers across the industrial, automotive, consumer, aerospace and defense, communications and computing markets. Headquartered in Chandler, Arizona, Microchip offers outstanding technical support along with dependable delivery and quality. For more information, visit the Microchip website at http://www.microchip.com.

Note: The Microchip name and logo and the Microchip logo are registered trademarks of Microchip Technology Incorporated in the U.S.A. and other countries. All other trademarks mentioned herein are the property of their respective companies.

Read more:
Microchip Unveils Industrys First Terabit-Scale Secure Ethernet PHY Family with Port Aggregation for Enterprise and Cloud Interconnect - Yahoo Finance

Empress EMS Announces Data Breach Leaking the Sensitive Information of 318,558 People – JD Supra

On September 9, 2022, Empress EMS reported a data breach with the U.S. Department of Health and Human Services Office for Civil Rights after the company was the victim of what appears to have been a ransomware attack. According to Empress EMS, the breach resulted in the names, Social Security numbers, dates of service and insurance information of 318,558 patients being compromised. Recently, Empress EMS sent out data breach letters to all affected parties, informing them of the incident and what they can do to protect themselves from identity theft and other frauds.

News of the Empress EMS comes from the companys official filing with the U.S. Department of Health and Human Services Office for Civil Rights as well as a notice posted on the companys website. According to these sources, on July 14, 2022, Empress EMS detected a network security incident, apparently when some or all of the companys computer system was encrypted. In response, the company reported the incident to law enforcement, secured its systems, and began working with third-party data security experts to conduct an investigation.

The companys investigation confirmed that an unauthorized party first gained access to the Empress EMS system on May 26, 2022 and subsequently copied files from the network on July 13, 2022.

Upon discovering that sensitive consumer data was accessible to an unauthorized party, Empress EMS then reviewed the affected files to determine what information was compromised and which consumers were impacted. While the breached information varies depending on the individual, it may include your name, the date you received service from Empress EMS, your Social Security number, and your insurance information.

On September 9, 2022, Empress EMS sent out data breach letters to all individuals whose information was compromised as a result of the recent data security incident. According to the U.S. Department of Health and Human Services Office for Civil Rights, these letters were sent out to 318,558 people. Empress EMS is offering all people impacted by the breach with free credit monitoring and is recommending they review their healthcare statements for accuracy and contact their provider if they see services they did not receive.

Founded in 1985, Empress EMS is an ambulance services company based in Yonkers, New York. The company provides 911 emergency medical response transportation to Yonkers and neighboring communities. Additionally, Empress EMS has emergency and non-emergency response contracts throughout Westchester County with districts, hospitals, correctional institutions and private care facilities. Empress EMS employs more than 204 people and generates approximately $17 million in annual revenue.

The Empress EMS filing with the U.S. Department of Health and Human Services Office for Civil Rights did not get into too much detail about the nature of the breach. However, the company provided some additional information in a letter posted on the Empress EMS website. There, the company noted that the data breach was caused by a network incident resulting in the encryption of some of our systems.

Encryption is a process that encodes files, making them inaccessible to anyone without the encryption key (which is usually a password). People encrypt files every day to protect sensitive data from unauthorized access. However, cybercriminals also use encryption when carrying out certain types of cyberattacksusually ransomware attacks.

A ransomware attack is a type of cyberattack that occurs when a hacker or other bad actor installs malware on a companys computer network. Hackers frequently do this by sending a phishing email to an employee in hopes of getting them to click on a malicious link. Once the employee clicks on the link, it downloads the malware onto their computer. The malware then encrypts the files on the computer and may infect other parts of the network. The hackers then send management a message, demanding it pays a ransom if it wants access to its network. Once the company pays the ransom, the hackers decrypt their computer, which ends the attackat least from the companys perspective.

However, more recently hackers have started to threaten to publish any stolen data if a company refuses to pay the ransom. Once on the dark web, cybercriminals can bid on the data, which they can then use to commit identity theft and other frauds. Of course, while companies that are targeted in a ransomware attack are victims in some sense, the real victims of these attacks are the consumers whose information ends up in the hands of those looking to commit fraud.

So, while Empress EMS did not mention the words ransomware attack in its communications, because we know it involved the encryption of the companys system, there is a good chance that this was caused by a ransomware attack.

Companies not only have the resources to pay an occasional ransom, but they also have the ability (and responsibility) to implement strong data security systems designed to prevent these attacks in the first place. Victims of a data breach who would like to learn how to reduce the risk of identity theft or learn about their options to hold the company that leaked their information accountable should contact a data breach lawyer as soon as possible.

If you are one of the more than 318,000 people who were affected by the Empress EMS data breach, it is imperative that you understand what is at stake and how you can mitigate these risks. If you or a loved one received services from Empress EMS and have not yet received a letter, you can review a copy of the letter here.

Read the original here:
Empress EMS Announces Data Breach Leaking the Sensitive Information of 318,558 People - JD Supra