FOIA Roundup: Avenues to accountability in the age of COVID-19 – MuckRock

June 23, 2020

The update on FOIA resources, successes, and obstacles.

This weeks roundup features free training on using public records to understand the countrys COVID-19 response, updates to the federal FOIA, and a way to contribute to police transparency. See something we missed? Let us know.

COVID Public Info is a new non-profit news collaboration between Outlier Media, the MuckRock Foundation, Matt Kiefer and Garance Burke, and it is made possible through the support of the John S. Knight Journalism Fellowship at Stanford University.

Join us for the first of these sessions Friday at 3:00 pm Eastern, during which well discuss basic requesting strategies to uncover important stories in your community. Register for this newsletter to get updates on upcoming trainings and resources.

Interested in getting more involved and helping dig through local data that tie into larger investigations with a national network of peers? Get in touch.

After Gov. Andrew Cuomo approved a bill to repeal 50-a protections of police and correctional officer records earlier this month, MuckRock began to submit hundreds of records requests for each police departments backlog of disciplinary records. On June 18, we received our first response containing disciplinary action reports from a New York police department, Allegany Village Police Department.

Multiple police departments, including the New York Police Department, have announced that they will be releasing disciplinary information publicly online.

Other elected officials are beginning to take a different approach. New York State Sen. George Borrello, after he learned that the Cuba Police Department had received a request from MuckRock, issued a press release questioning the purpose of releasing the information.

At the time, MuckRock had not yet received an acknowledgment letter from the police department. You can follow the Cuba PD request here by selecting Follow at the top of the page (you need to be logged in). Check out all of our New York requests on the project page.

The Office of Government Information Services recently reviewed 305 federal FOIA websites and found that 62.6 percent of them did not alert requesters to changes in agency FOIA processing caused by the shift to full-time teleworking. (OGIS FOIA Ombudsman)

Previously-redacted portions of the Mueller report have been released, revealing more details of conversations Roger Stone and President Trump had about WikiLeaks releases of Hillary Clintons emails. Jason Leopold, Ken Bensinger, and Anthony Cormier at BuzzFeed report.

Treasury Secretary Steven Mnuchin said last week that his agency would not be providing details on who has received funding under the federal governments Paycheck Protection Program. But following backlash from lawmakers and the public, the Small Business Administration and the Treasury Department announced Friday that they would now disclose entities receiving more than $150,000 in loans, as reported by Mark Niquette for Bloomberg. More than $550 billion in spending has been approved under the PPP, and the majority of loans are not large enough to reach the current disclosure threshold.

Conan, the canine famous for its involvement in the raid on Abu Bakr al-Baghdadi, is now the subject of a lawsuit to determine which pronouns to use for the patriot and how injuries sustained in the mission were treated, as Freddy Martinez writes for Motherboard).

Michael Scott Davidson, writing for the Las Vegas Review-Journal, reports that beginning July 1, Las Vegas police will charge $280 for each hour of body camera footage requested by the public, regardless of actual redaction or search time.

Despite efforts by the Chicago Fraternal Order of Police, the Illinois Supreme Court ruled 6-1 on Thursday that complaints and other records, even those older than five years, must remain accessible to the public, as Jeremy Gorner, John Byrne, and Dan Hinkel report for the Chicago Tribune. The contractual rights that were in our collective bargaining agreement for the better part of four decades were set in stone, said Fraternal Order of Police President John Catanzara. The police union is considering additional challenges to the ruling.

See something we should include in our next update? Please let us know.

Image by CSPAN via Steven Mnuchins Twitter account.

Originally posted here:
FOIA Roundup: Avenues to accountability in the age of COVID-19 - MuckRock

Time to Think About the How and Where of Cryptography – Electronic Design

>> Electronic Design Resources.. >> Library: Article Series.. .. >> Series: The Cryptography Handbook

Threats from various sources relentlessly attack all our connected systems. Connected systems dont necessarily mean those connected to the internet. It could also include a pulse oximeter connected to a patient in a hospital environment or a printer cartridge connected to a printer. The current plethora of Internet of Things (IoT) devices like thermostats and refrigerators are also susceptible to hacking. Lets look at a few of these threats and learn how to protect your devices and see what kind of planning you need to do.

Threats

Two kind of threats face developers today: threats to systems and threats to security ICs.

Threats to systems have been well covered by other sources, so well focus on threats to security ICs. A security IC can be attacked by one or more of the following attack methods:

Most of the time, side-channel attacks are noninvasive attacks, i.e., they dont destroy the IC. Decapping and micro-probing, which physically investigate various features of the IC, are invasive attacks that can destroy the IC.

Were wont go into too much detail about how these attacks are carried out, but well present a couple of simple examples.

Active Side-Channel Attack: Glitch Attack

A side channel includes any information thats available as a side effect of the physical implementation of hardware. This may include power consumption, injection of faults, etc. Figure 1 shows a type of side-channel attack using clock glitches. This is an example of a noninvasive attack.

1. An active side-channel attack is an example of a noninvasive attack.

An individual skilled enough to look at the unknown output from a clock glitch or sped-up clock could discover a pattern that could eventually reveal an encryption key.

Decapsulation

Decapsulation, also knows as de-capping, involves soaking the plastic package that encapsulates the silicon die into fuming nitric acid and melting the package away (Fig. 2). Normally, before thats done, the lead frame holding the semiconductor die is secured on a frame. This is considered an invasive attack.

2. Semiconductor packages are vulnerable to invasive attacks.

Semiconductor Package

Once the package is melted away, the die gets exposed and this gives the hacker an opportunity to directly probe all of the available pads, including pads that the manufacturer used for internal setup (Fig. 3). They can also polish away the top protective glass and access the internal interconnects of the device. Using this direct method, the hacker will try to gain access to the devices secrets.

3. Hackers can directly probe available pads on a chip (top view).

Countermeasures

To prevent people with malicious intent from breaking into a secure device, it must be designed with features that not only provide security, but also protect the device from attacks.

For example, Maxims secure devices have robust countermeasures to protect against these attacks. Some of the implemented features include:

Security Planning

Depending on the application need, the user must decide what features of cryptography are appropriate for deployment. The table below gives some examples of application needs and the resultant measures that must be applied.

For example, if someone is trying to prevent a medical surgical tool from being counterfeited, they must ensure that every time a tool is connected to the host controller (Fig. 4), the tools authenticity is checked. It will also require protection against any malware from being installed in the tool, which could potentially harm the patient. The need to protect any calibration data that was stored is paramount as well.

4. Security planning should include counterfeit prevention for medical devices like surgical tools.

However, because the possibility of snooping between the tool and the host controller is next to impossible due to closed system connectivity, this system will not require protection against eavesdropping. Thus, in this case, the system designer should plan for all of the protections under the Authenticity column, but can skip unnecessary protection listed under the Confidentiality column.

Conclusion

Threats to ICs are ever present and come from many sources. A system designer needs to be aware of the types of threats and plan accordingly. This article gave you some simple insights into how that can be achieved.

But if youre a busy product developer with a tight deadline, do you really have the time to be an expert in this field as well as complete your design on time? Probably not. Thats where the use of a secure authenticator designed and built by industry experts may be a good option.

The next article in this series will review how secure authentication products can be quickly deployed for cryptographic security needs.

Zia A. Sardar is Principal Member of Technical Staff at Maxim Integrated.

>> Electronic Design Resources.. >> Library: Article Series.. .. >> Series: The Cryptography Handbook

Read more:
Time to Think About the How and Where of Cryptography - Electronic Design

NTT Research Builds Upon its Micro Technologies and Cryptography Expertise with Distinguished New Hires – Business Wire

PALO ALTO, Calif.--(BUSINESS WIRE)--NTT Research, Inc., a division of NTT (TYO:9432), today announced that it has named Dr. Tetsuhiko Teshima as a Research Scientist in its Medical and Health Informatics (MEI) Lab. Dr. Teshima has also joined the Technical University of Munich (TUM) Neuroelectronics Group as a Visiting Researcher. NTT Research and TUM last fall entered into a joint research agreement to explore implantable electronic systems to affect the future of patient care. An expert in micro technologies, Dr. Teshima will be working full-time at TUM in the area of advanced neuroelectronics and biosensor technology. Dr. Teshima began his three-year appointment on March 1, 2020.

Dr. Teshimas research has covered a broad range of topics that overlap with the MEI Labs mission, including micro bio-nano interfaces, parasitology, soft matter, hierarchical self-assembly, thin-film manufacturing techniques, soft lithography, microfluidics, revolutionary tools for single-cell measurements, mechano-biology and three-dimensional synthetic tissue and organs. He comes to NTT Research after holding positions at NTTs Bio-medical Informatics Research Center, the National Institute of Science and Technology Policy (NISTEP) and NTTs Basic Research Laboratories. He holds a M.S. (biology) and Ph.D. (information science and technology) from the University of Tokyo, where he also held a Japan Society for the Promotion of Science (JSPS) post-doctoral fellowship for three years at the Institute of Industrial Science.

Dr. Teshima is a top young scientist in Japan who has made a mark in various areas of micro technologies, said MEI Lab Director Hitonobu Tomoike. I expect a good chemical reaction between him and the brilliant scientists in Munich.

NTT Research also announced that it has named Vipul Goyal as Senior Scientist in its Cryptography and Information Security (CIS) Lab. Dr. Goyal is an associate professor of computer science, Carnegie Mellon University, which he joined in 2016. Previously, he spent seven years as a researcher in the Cryptography and Complexity Group at Microsoft Research, India. He is a winner of several honors, including a 2016 Association for Computing Machinery (ACM) Conference on Computer and Communications Security (CCS) test-of-time Award, a JP Morgan faculty fellowship, and a Google outstanding graduate student award. He received his Ph.D. at the University of California, Los Angeles.

Named to Forbes Magazines 30 Under 30 list of people changing science and healthcare in 2013, Dr. Goyal has published more than 80 technical papers. Broadly interested in all areas of cryptography, he has a particular focus on the foundations of the field. His current research topics include secure multi-party computation, non-malleable cryptography and foundations of blockchains.

Also joining the CIS Lab is Justin Holmgren as Scientist. Prior to his current role at NTT Research, Dr. Holmgren was a Google Research Fellow at the Simons Institute for the Theory of Computing. Dr. Holmgren was previously a post-doctoral research fellow at Princeton University and received his Ph.D. in 2018 at the Massachusetts Institute of Technology (MIT), where he was advised by Professor Shafi Goldwasser. His work, which includes 15 published papers, has notably advanced the feasibility of securely outsourcing computation, private information retrieval and software watermarking. At NTT Research, he will be studying the foundational theory of cryptography, along with its interplay with diverse areas of computer science.

We are delighted to welcome Drs. Goyal and Holmgren on our journey to a more secure future for everyone, said CIS Lab Director Tatsuaki Okamoto. Only by engaging the strongest and most dedicated researchers can we address the foundational research problems in cryptography, and so deliver long-term impact to the field.

In related personnel news, NTT Research last month announced the appointment of Joe Alexander (M.D., Ph.D.) as Distinguished Scientist in the MEI Lab and Hoeteck Wee as a Senior Scientist in the CIS Lab. Dr. Alexander is leading the MEI Labs bio digital twin initiative. In February, NTT Research announced that the CIS Lab had reached joint research agreements with UCLA and Georgetown University, covering theoretical aspects of cryptography and global scale blockchain testbed research, respectively. NTT Researchs Physics and Informatics (PHI) Lab last year reached joint research agreements with six universities, one government agency and one quantum computing software company.

About NTT Research

NTT Research opened its Palo Alto offices in July 2019 as a new Silicon Valley startup to conduct basic research and advance technologies that promote positive change for humankind. Currently, three labs are housed at NTT Research: the Physics and Informatics (PHI) Lab, the Cryptography and Information Security (CIS) Lab, and the Medical and Health Informatics (MEI) Lab. The organization aims to upgrade reality in three areas: 1) quantum information, neuro-science and photonics; 2) cryptographic and information security; and 3) medical and health informatics. NTT Research is part of NTT, a global technology and business solutions provider with an annual R&D budget of $3.6 billion.

NTT and the NTT logo are registered trademarks or trademarks of NIPPON TELEGRAPH AND TELEPHONE CORPORATION and/or its affiliates. All other referenced product names are trademarks of their respective owners. 2020 NIPPON TELEGRAPH AND TELEPHONE CORPORATION

Visit link:
NTT Research Builds Upon its Micro Technologies and Cryptography Expertise with Distinguished New Hires - Business Wire

Julian Assange Extradition and the Freedom of Bitcoin Bitcoin… – Bitcoin Magazine

WikiLeaks founder Julian Assange is currently being held on remand in a London maximum-security prison, solely on the basis of a U.S. extradition request. Assange has been charged with 17 counts of espionage related to WikiLeaks 2010 to 2011 publications concerning the U.S. wars in Iraq and Afghanistan, embarrassing U.S. diplomatic communications and evidence of torture in the Guantanamo Bay detention camp.

Assanges U.S. extradition case is recognized by free speech groups as the most important press freedom case of the 21st century. As the aggressive judicial overreach of this U.S. government is already creating a chilling effect on reporters and media organizations, some recognize consequences far beyond the future of journalism.

Julian Assanges father, John Shipton, who regularly attends cryptocurrency conferences, has warned those who are involved in the development of new technologies that they are not immune to suffering the same fate as his son.

How does the prosecution of Assange threaten the crypto movement? And why does the Bitcoin community need to be concerned about his plight for freedom?

At its heart, WikiLeaks is an innovative endeavor. Started as a project of Sunshine Press, it was an invention of a new form of journalism built on the platform of the internet. On its websites About page, WikiLeaks described how it started with an online dialogue between activists around the world, who shared their aspiration to eliminate injustice and human suffering caused by the abuses of power of corporations and governments, especially oppressive regimes.

WikiLeaks also acknowledges the efforts of Philip Zimmerman, the creator of an encryption software program known as Pretty Good Privacy, or PGP, and how the vision of this lone computer programmer in Colorado instigated a global revolution for mass distribution of privacy technologies.

Inspired by this pioneer of private and secure online communication, the founding members of WikiLeaks sought for a way to deploy information technologies to create a robust system of publishing that protects the anonymity of sources and enables transparency of the powerful. This new journalistic organization aimed to make document leaking technology available at a global scale in order to better bring accountability to governments and other institutions.

History has shown how new ideas and inventions are often met with opposition and fierce condemnation by the state. At the start of the 1990s, when Zimmermann released PGP, the U.S. government considered what he had done the equivalent of exporting munitions. It launched a three-year criminal investigation against him, creating a battle over encryption that became known to some as The Crypto Wars. The case was eventually dropped when U.S. courts ruled that software source code qualifies as speech protected by the First Amendment of the U.S. Constitution.

Two decades later, WikiLeaks efforts to amplify information technologies to tackle the problem of government secrecy created another global revolution, this time disrupting the media landscape. Like its forerunner, this new free press of the digital age soon became a target of political retaliation.

After WikiLeaks released classified documents that revealed U.S. war crimes, the U.S. government decided that its editor-in-chief had damaged national security, though it produced no shred of evidence that the published documents caused any harm. It effectively declared war on the First Amendment, charging an Australian journalist under the Espionage Act in the District Court for the Eastern District of Virginia. Just as in the first Crypto War, where it tried to ban encryption, it was now trying to shut down WikiLeaks.

What is this new Crypto War now being waged against the whistleblowing site all about? This battle is not just about Assange as an individual. While mainstream media fixates on Assange and his character, WikiLeaks is not driven solely by one charismatic man. Behind the organization, there are thousands of ordinary people worldwide who are dedicated to the principle of freedom of speech.

At the end of 2010, when WikiLeaks began publishing troves of sensitive U.S. diplomatic cables, its website came under heavy pressure by the U.S. government and its allies. Insurgency swiftly emerged from deep inside the web to help WikiLeaks counteract distributed-denial-of-service (DDOS) attacks. By keeping multiple copies of its website, and setting up mirror sites, anonymous networks allowed information to continue to flow.

Inspiring those collective acts of resistance in an underground subculture of the internet are shared values and ideals, embodied in the cypherpunk philosophy. Emerging in the late 1980s, the cypherpunk movement is a loosely tied group of mathematicians, computer scientists and online activists who advocate privacy through the use of strong cryptography.

Assange is known to have joined the cypherpunk mailing list in late 1993 or early 1994. His engagement with those on the edges on the internet had a large influence on his intellectual development. The native Australian software programmer and expert in cryptography once summed up the core values behind WikiLeaks by saying, capable, generous men do not create victims, they nurture victims.

He acknowledged this is something that he learned from his own father and other capable, generous men in his life. This moral value, installed at an early age, found practical application in the cypherpunks core belief: Cryptography can be a key tool for protecting individual autonomy threatened by power.

In his 2006 essay Conspiracy as Governance, a kind of manifesto from which WikiLeaks was conceived, Assange analyzed the structure of power and means to shift the balance of power between the individual and the state. By using cryptography as a non-violent democratic weapon that gives claws to the weak, Assange found a way to provide information to the public, to hold the powerful accountable, and to help ordinary people empower themselves with knowledge.

Cypherpunks saw the political implications of their work and strove for proper use of the power inherent in cryptography. This attitude has shaped the ethics of cryptographers and defined cypherpunk cryptography as crypto with values.

Eric Hughes who, in 1992, co-founded the influential cypherpunk mailing list, together with Timothy C. May and John Gilmore, described those values as openness, the free flow of information and decentralization. In A Cypherpunks Manifesto, published in 1993, he declared that code is free for all to use, worldwide. Assange also articulated the moral values of cypherpunks, noting the whole point of free software is to liberate it in all senses. He added that, Its part of the intellectual heritage of man. True intellectual heritage cant be bound up in intellectual property.

Instead of claiming ownership of their knowledge, cypherpunks aimed to build software on a ground of free sharing and open platforms, in which everyone can participate and make contributions to the development and utilization.

Zimmermann gave PGP away online, making the source code free and freely available. Through people all over the world simply downloading and using it, the decentralization of that technology helped to secure the right to privacy at a large scale. By deploying an anonymous, secure drop box, WikiLeaks made it possible for people around the globe to speak out against their governments wrongdoing without fear of their identity being revealed. Courage of whistleblowers became contagious, creating waves of disclosures. WikiLeaks, powered by free software, began to liberate information that had been captured under the proprietary ownership of corporations and governments.

It is with this cypherpunk vision of ethics that Satoshi Nakamoto, the pseudonymous creator of Bitcoin, also published its white paper online. The invention of Bitcoin, a peer-to-peer electronic cash system, unleashed the revolutionary power of cryptography. This community-driven, free software project set in motion a decentralized movement to liberate money from the monopoly of central banks. By people across the world simply choosing to run full nodes, each containing a complete record of all Bitcoin transactions, a network secures this stateless digital cash as a form of free speech that belongs to everyone.

Years before the U.S. governments assault on free speech escalated into the indictment against the WikiLeaks founder, the mysterious creator of Bitcoin recognized the potential fate that would befall the worlds first global Fourth Estate.

In December 2010, WikiLeaks faced the unlawful financial blockade imposed by private payment processing companies, and the organization was considering using Bitcoin to circumvent it. Satoshi, who was concerned about the risk of drawing unwanted government attention to his then infant currency, appealed to WikiLeaks not to take such action.

In an online post, Satoshi noted that, WikiLeaks has kicked the hornets nest, and the swarm is headed towards us.

WikiLeaks eventually did turn to Bitcoin to achieve financial sovereignty. And now the swarm is now getting larger, bringing a new war on cryptography.

The citizens of the internet have been longing for another world, independent from the old world of exploitation, violence and control. Dreams for freenet, for the internet to become an emancipatory tool for building peer-to-peer systems, have united people around the world together in the frontier of cyberspace.

Meanwhile, the U.S. governments prosecution of Assange is a direct attack on freedom of expression; peoples ability to form and exchange ideas and collaborate creatively. What is now being threatened is our shared values and a vision for the future of the internet at the heart of Bitcoins decentralized consensus.

Bitcoin, from its inception, was a political act. This is shown in the highly politicized message in the genesis block, referring to a banking bailout. In the lively discussion of public cryptography in 1992 on the cypherpunk mailing list, the late Hal Finney, a noted cryptographer who is considered to be one of the earliest Bitcoin pioneers, reminded us of the ethical responsibility of cryptographers:

The computer can be used as a tool to liberate and protect people, rather than to control them, Finney, who received the very first bitcoin transaction sent by Satoshi, wrote, urging Bitcoin early adopters to put their unearned wealth to good use.

Now, as Assanges U.S. extradition battle intensifies, the internet is calling for the rise of cypherpunks Assanges fellow capable generous men, who exercise their power for social good to unite once again and take up their moral duty. The future of the internet believes in Bitcoin, the potential of this crypto with values to become the currency of resistance to defend its freedom.

Authors Note: WikiLeaks has launched the official campaign page, Dont Extradite Assange. You can get information on how you can help stop Assanges extradition. Please consider donating to the WikiLeaks official Defense Fund and take action.

This is a guest post by Nozomi Hayase. Opinions expressed are entirely her own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.

Read more:
Julian Assange Extradition and the Freedom of Bitcoin Bitcoin... - Bitcoin Magazine

Safari to support password-less logins via Face ID and Touch ID later this year – The Verge

Safari 14, the version of Apples browser that will ship with iOS 14 and macOS Big Sur, will let you use Face ID or Touch ID to log in to websites built to support the feature. The functionality was confirmed the browsers beta release notes, and Apple has detailed how the feature works in a WWDC video for developers. The functionality is built on the WebAuthn component of the FIDO2 standard, developed by the FIDO Alliance. It should make logging into a website as easy as logging into an app secured with Touch ID or Face ID.

WebAuthn is an API that aims to make web logins simpler and more secure. Unlike passwords, which are often easily guessed and vulnerable to phishing attacks, WebAuthn uses public key cryptography and can use security methods like biometrics or hardware security keys to verify your identity. Its a standard that individual websites need to add support for, but being supported by the stock browser in iOS has the potential to be a major boost for adoption.

This isnt the first time Apple has supported parts of the FIDO2 standard. Last years iOS 13.3 added support for physical FIDO2-compliant security keys with the Safari web browser, and Google started making use of this with its accounts on iOS earlier this month. These security keys offer more protection for your account since an attacker would need physical access to your key to gain access to your account. Support for security keys also came to Safari on macOS in 2019. However, Safari 14s functionality should be a lot more seamless, relying on the biometric security thats built into your Apple device rather than needing a separate piece of hardware in the form of a security key.

The new iOS functionality is similar to whats previously been added to Android. Googles mobile OS gained FIDO2 certification last year, and the company later made it possible to log into some of its services in the Chrome browser on Android without needing a password.

Apples devices have been able to use Touch ID and Face ID as part of the online login process in the past, but previously, this has relied on using the biometric security to autofill previously stored passwords into websites. Once set up, WebAuthn can be used to bypass the password process, meaning its not vulnerable to the same kinds of attacks that can make passwords insecure.

Apple, which joined the FIDO Alliance earlier this year, joins a growing list of companies that are throwing their weight behind the FIDO2 standard. As well as the Google initiatives detailed above, Microsoft announced plans to make Windows 10 password-less last year, and it started allowing users to sign into its accounts in its Edge browser using security keys and its biometric Windows Hello security feature back in 2018.

See the rest here:
Safari to support password-less logins via Face ID and Touch ID later this year - The Verge

Global Quantum Cryptography Solutions Market is accounted for xx USD million in 2019 and is expected to reach xx USD million by 2025 growing at a CAGR…

This well versed report is thoughtfully crafted to arm report readers with convincing market insights on the mettle of all aforementioned factors that propel relentless growth despite significant bottlenecks in the Quantum Cryptography Solutions Market.

This recent research compilation on the Quantum Cryptography Solutions market presents a deep analytical review and a concise presentation of ongoing market trends that collectively inculcate a strong influence on the growth trajectory of the aforementioned Quantum Cryptography Solutions market.

This study covers following key players:ID QuantiqueMagiQ TechnologiesQuantum XCQubitekkQuintessenceLabs

Request a sample of this report @ https://www.orbismarketreports.com/sample-request/92546?utm_source=Pooja

This illustrative research report on the Quantum Cryptography Solutions market is an all-in-one, ready to use handbook of market dynamics that upon mindful inference lends valuable insights on market developments, growth trajectory, dominant trends as well as technological sophistication as well as segment expansion and competition spectrum that have a strong bearing on the growth probabilities of the Quantum Cryptography Solutions market. The report is so designed as to direct concrete headways in identifying and deciphering each of the market dimensions to evaluate logical derivatives which have the potential to set the growth course in the aforementioned Quantum Cryptography Solutions market.

This high-end research comprehension on the Quantum Cryptography Solutions market renders major impetus on detailed growth facets, in terms of product section, payment and transaction platforms, further incorporating service portfolio, applications, as well as a specific compilation on technological interventions that facilitate ideal growth potential of the market.

Access Complete Report @ https://www.orbismarketreports.com/global-quantum-cryptography-solutions-market-growth-analysis-by-trends-and-forecast-2019-2025utm_source=Pooja

Market segment by Type, the product can be split into NetworkApplication Security

Market segment by Application, split into G&PDefenseBFSITelecom

Besides presenting notable insights on market factors comprising above determinants, this specific, innately crafted research report offering further in its subsequent sections states information on regional segmentation, as well as thoughtful perspectives on specific understanding comprising region-specific developments as well as leading market players objectives to trigger maximum revenue generation and profits. This particular section of the Quantum Cryptography Solutions market report specifically stresses upon various indigenous tactical discretion that eventually contributed towards soliciting heralding market consolidation, impeccable stability and sustainable revenue pools, the ultimate touchstone to judge the potency of the Quantum Cryptography Solutions market.

The report further unveils pertinent details about segment contribution in coining ample revenue flow, sustainability and long term growth in global Quantum Cryptography Solutions market. A thorough knowledge base of market facets remains integral and indispensable to decode Quantum Cryptography Solutions market prognosis.

Some Major TOC Points:1 Report Overview2 Global Growth Trends3 Market Share by Key Players4 Breakdown Data by Type and ApplicationContinued

In addition to all of the above stated inputs, discussed at length in the report, the report sheds tangible light on dynamic segmentation based on which the market has been systematically split into prominent segments inclusive of type, end use technology, as well as region specific diversification of the Quantum Cryptography Solutions market to encourage highly remunerative business discretion. The report sheds light on the particular segment that sets revenue maximization, rolling, thus incurring steady growth in revenues and contributing towards steady sustenance of the Quantum Cryptography Solutions market.

For Enquiry before buying report @ https://www.orbismarketreports.com/enquiry-before-buying/92546?utm_source=Pooja

About Us : With unfailing market gauging skills, has been excelling in curating tailored business intelligence data across industry verticals. Constantly thriving to expand our skill development, our strength lies in dedicated intellectuals with dynamic problem solving intent, ever willing to mold boundaries to scale heights in market interpretation.

Contact Us : Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155

Go here to read the rest:
Global Quantum Cryptography Solutions Market is accounted for xx USD million in 2019 and is expected to reach xx USD million by 2025 growing at a CAGR...

Quantum Cryptography Market Analysis Growth Opportunities and Demand Drives by 2016 to 2028 – Owned

A recent report published by QMI on quantum cryptography market is a detailed assessment of the most important market dynamics. After carrying out thorough research of quantum cryptography market historical as well as current growth parameters, business expectations for growth are obtained with utmost precision. The study identifies specific and important factors affecting the market for quantum cryptography during the forecast period. It can enable companies investing in quantum cryptography market to change their production and marketing strategies in order to envisage maximum growth.

Get Sample Copy of This Report @https://www.quincemarketinsights.com/request-sample-62405?utm_source=Pooja/PF

According to the report, thequantum cryptography market has been segmented, by component (solutions and services), by services (consulting and advisory, deployment and integration, and support and maintenance), by security type (network and application security), by vertical (government and defense, bfsi, retail, healthcare, automotive, others).

Insights about regional distribution of market:

The market has been segmented in major regions to understand the global development and demand patterns of this market.

For quantum cryptography market, the segments by region are for North America, Asia Pacific, Western Europe, Eastern Europe, Middle East, and Rest of the World. During the forecast period, North America, Asia Pacific and Western Europe are expected to be major regions on the quantum cryptography market.

North America and Western Europe have been one of the key regions with technological advancements in ICT, electronics & semiconductor sector. Factors like the use of advanced technology and presence of global companies to cater the potential end users are favourable for the growth of quantum cryptography market.Also, most of the leading companies have headquarters in these regions.

Company profiled in this report based on Business overview, Financial data, Product landscape,Strategic outlook & SWOT analysis:

Make an Inquiry for purchasing this Report @https://www.quincemarketinsights.com/enquiry-before-buying/enquiry-before-buying-62405?utm_source=Pooja/PF

Asia Pacific is estimated to be one of the fastest growing markets for quantum cryptography market. Major countries in the Asia Pacific region are China, Japan, South Korea, India and Australia. These economies in the APAC region are major contributors in the ICT, electronics & semiconductor sector. In addition to this, government initiatives to promote technological advancement in this region are also one of the key factors to the growth of quantum cryptography market. Middle East and rest of the World are estimated to be emerging regions for quantum cryptography market.

Market Segmentation:

ByComponent:

Solution and Services

ByServices:

Consulting and Advisory

Deployment and Integration

Support and Maintenance

By Security Type:

Network and Application Security

ByVertical:

Government and defense

BFSI

Retail

Healthcare

Automotive

Others

By Region:

North America

North America, by Country

US

Canada

Mexico

North America, by Component

North America, by Services

North America, by Security Type

North America, by Vertical

Western Europe

Western Europe, by Country

Germany

UK

France

Italy

Spain

The Netherlands

Rest of Western Europe

Western Europe, by Component

Western Europe, by Services

Western Europe, by Security Type

Western Europe, byVertical

Asia Pacific

Asia Pacific, by Country

China

India

Japan

South Korea

Australia

Indonesia

Rest of Asia Pacific

Asia Pacific, by Component

Asia Pacific, by Services

Asia Pacific, by Security Type

Asia Pacific, byVertical

Eastern Europe

Eastern Europe, by Country

Russia

Turkey

Rest of Eastern Europe

Eastern Europe, by Component

Eastern Europe, by Services

Eastern Europe, by Security Type

Eastern Europe, byVertical

Middle East

Middle East, by Country

UAE

Saudi Arabia

Qatar

Iran

Rest of Middle East

Middle East, by Component

Middle East, by Services

Middle East, by Security Type

Middle East, byVertical

Rest of the World

Rest of the World, by Country

South America

Africa

Rest of the World, by Component

Rest of the World, by Services

Rest of the World, by Security Type

Rest of the World, byVertical

Objectives of this report:

Reasons to Buy This Report:

Customization:

This study is customized to meet your specific requirements:

Contact UsQuince Market InsightsAjay D. (Knowledge Partner)Office No- A109,Pune, Maharashtra 411028Phone: +91 706 672 5858/+1 208 405 2835/+91 706 672 4848Email:[emailprotected]Web:www.quincemarketinsights.com

ABOUT US:QMI has the most comprehensive collection of market research products and services available on the web. We deliver reports from virtually all major publications and refresh our list regularly to provide you with immediate online access to the worlds most extensive and up-to-date archive of professional insights into global markets, companies, goods, and patterns.

Here is the original post:
Quantum Cryptography Market Analysis Growth Opportunities and Demand Drives by 2016 to 2028 - Owned

Tel Aviv University’s online cybersecurity course ranked first in the world – Ynetnews

Tel Aviv University's online cybersecurity course - free and already viewed by users in 150 countries - has taken the top spot in the world among the online courses available in the field.

Launched in December 2019 by Prof. Avishai Wool and Dan Gittik with the help of the Israeli company Checkpoint, the online course "Unlocking Information Security," reached number one in six months.

Illustration

(Photo: Shutterstock)

It also came in first place in cryptography courses and sixth among 1,750 online computer courses, surpassing renowned courses from universities such as Stanford and Princeton, according to a statement from Tel Aviv University.

"Students around the world are looking for the most current and relevant courses," said Yuval Shraibman, director of TAU Online, the Center for Educational Innovation at Tel Aviv University.

"To our great joy, Israel is considered a leading power in the field of cybersecurity, and this new course, therefore, attracts many young people who want to train in information security."

The field of information security is growing rapidly and there is a great demand for employees with knowledge in the field.

Illustration

(Photo: Reuters)

Many companies seek formal training from employees who wish to move into the cybersecurity field.

The course provides its students with an in-depth understanding of key topics in the field, such as cryptography, security of identification systems, attacks and defenses on the internet, and familiarity with viruses and other malware.

The ranking was done by the Class Central website, which coordinates assessments of online university training platforms around the world.

Originally posted here:
Tel Aviv University's online cybersecurity course ranked first in the world - Ynetnews

Zeva Launches ZevaCrypt, a Solution to Simplify Use of End-to-End PIV Encryption Across Federal Agencies Including Contractors – GlobeNewswire

WASHINGTON, June 23, 2020 (GLOBE NEWSWIRE) -- Zeva, Inc. a leader in Public Key Enablement, IT modernization and encryption solutions, today announced the launch of ZevaCrypt, Zevas end-to-end encryption service to help federal agencies more easily use their existing PIV encryption infrastructure with emails and documents exchanged between agencies and with contractors.

By using ZevaCrypt, agencies benefit from greater security with PIV-enabled end-to-end encryption and identity assurance, and an increased return on investment for their existing PIV infrastructure by making it more widely useable. ZevaCrypt also helps federal agencies comply with the 2019 OMB M-19-17 directive advising the use of HSPD-12 PIV encryption.

Finding the right PIV identity and assurance credentials are major problems when working across agencies or with contractors, said Sam Andoni, founder and president of Zeva Inc. ZevaCrypt automates the discovery of trusted, federated PIV credentials and selects the correct certificate for the highest assurance level available. Replacing current manual, confusing and time-consuming credential discovery processes with ZevaCrypt will enable agencies to use federated PKI and PIV identity assurance levels across agencies, including contractors, seamlessly and intuitively.

ZevaCrypt is a comprehensive solution that addresses the challenges of PIV identity discovery and certificate selection between different organizations, problems that made using PIV encryption difficult and time consuming for users. Essential ZevaCrypt business values include:

Zeva is well qualified to tackle the challenge of end-to-end PIV encryption between federal agencies. For many years, Zevas bulk decryption solution DecryptNaBox, has been the go-to solution to the federal governments vexing downstream issues of encryption e-discovery, FOIA requests and investigation involving encrypted documents. Zevas innovative solution enabled many agencies to continue to encrypt highly sensitive and classified documents and at the same time ensure that congress, lawyers and investigators can do their jobs when they need to access encrypted files.

While DecryptNaBox helps organization manage their encrypted data, the new ZevaCrypt immediately enables organizations to start using their existing PIV encryption infrastructure more broadly across agencies. Together, these two solutions offer a wholistic strategy for achieving end-to-end encryption across the government.

More information on Zevas ZevaCrypt Solution can be found online.

Resources

ZevaCrypt Website

ZevaCrypt Brochure

About ZevaZeva (www.zevainc.com) provides software solutions and expert consulting for advanced Public Key Enablement, IT modernization and encryption solutions to ensure the security and operational efficiency of data and transaction processing.

For government and commercial clients, the companys solutions significantly increase the return on investment on their enterprise Public Key Infrastructure (PKI) by extending the encryption and decryption solutions that can be utilized across their enterprise.

Zeva helps greatly simplify employees use of their enterprise PKI between organizations as well as managing encryption lifecycle issues, such as encryption key recovery automation for e-discovery, FOIA requests and investigation involving encrypted documents.

Beyond encryption and decryption services, Zeva is also a leading tailored services provider for Identity and Access Management, IT Modernization, Cybersecurity technology, Data Forensics and custom software development.

CONTACT:Dana KringelMontner Tech PR203-226-9290dkringel@montner.com

See the original post:
Zeva Launches ZevaCrypt, a Solution to Simplify Use of End-to-End PIV Encryption Across Federal Agencies Including Contractors - GlobeNewswire

What are police talking about on their encrypted radios? The public may soon find out [update] – LancasterOnline

Lancaster County residents could soon have access to police communications, which have been restricted for the past two and a half years.

In response to the George Floyd protests, County Commissioner Craig Lehman on Tuesday proposed reversing a 2017 decision to restrict public access to the system, which he voted against.

The matter could go to a vote in early August.

At the time, Commissioner Josh Parsons and former Commissioner Dennis Stuckey sided with the argument from the Lancaster County Chiefs of Police Association that the change was needed to protect police safety.

Parsons, now questioning the credibility of the association, said he is open to changing his vote, possibly tipping the scales in favor of opening the system for public listening.

"(When I voted to encrypt), it was based largely on the chiefs' credibility and on the assumption that they were acting in good faith," he said. "That trust has been broken."

Success! An email has been sent with a link to confirm list signup.

Error! There was an error processing your request.

In an hourlong discussion Tuesday, the board of commissioners, the county's attorney, various Lancaster County police chiefs and District Attorney Heather Adams discussed the encryption.

Lehman said he introduced the idea to allow access two weeks ago in response to protests and because encryption of the system gave police a false sense of security while simultaneously having the possibility of breeding mistrust among the public with a perception of law enforcement communications happening in secret.

"Im a firm believer that transparency is foundational to any reform, and that includes police reform," Lehman said.

Parsons said the 2017 decision to encrypt was a "close call" between his desire for transparency and desire to protect police safety.

In 2017, the argument from the chiefs of police association was that encryption wouldprotect police from ambushes and secure personal information about crime victims and witnesses.

Parsons now says the credibility of the association has been "largelydestroyed." He referenced a struggle between the commissioners office and former District Attorney Craig Stedman to get access to drug forfeiture financial records following LNP | LancasterOnline's reporting on a vehicle leased by Stedman.

"We took a lot of criticism from many corners for doing so, includingthe chiefs of police association," he said. "They should have been supporting our fight for ethical behavior, not opposing it.

The spat between the association and the commissioners continued for severalmonths, with various letters being traded accusing Parsons of misusinghis positionand claims that the association had been "used" by Stedman.

East Earl Police Chief Kevin McCarthy, president of the police association, apologizedto Parsons on behalf of the association for offending him and later said he was supporting the former District Attorneys line of argument based on blind faith he had for Stedman, as he does for Adams now.

I agree with (Commissioner Lehmans) argument, McCarthy said. If thats the decision of the board, that (decryption) will create more transparency, Ill agree with you.

Adams said she thought the 2017 decision was the correct one, citing a court rule that restricts some confidential information as well as restrictions on confidential information in the states open-records law.

Lancaster County solicitor Chris Hausner chimed in to say that the county had tried making an argument about the court rule in a records case with LNP | LancasterOnline regarding autopsy records, and the argument was rejected by the court. Mike Weaver, who heads Lancaster County-Wide Communications, also mentioned that laws from the AIDS crisis established that citizens give up their right to privacy when they call 911.

Weaver also said that decryption would cost roughly $100,000, which Lehman said he would happily spend.

Toward the end of the meeting, Lehman proposed a deal to allow media organizations access to the encrypted system as a work-around. McCarthy said he was not necessarily opposed to the idea but that there are questions about defining a media organization and live broadcasts would be reported with accuracy when situations change on the ground.

We believe the decision to encrypt those communications, approved by the county board of commissioners without evidence that a single investigation had been hindered, dealt a blow to transparency, accountability and trust in our government agencies at a time when citizens need them most, LNP | LancasterOnline executive editor Tom Murse said. We believe all citizens should have access to those dispatches, and support any step toward providing Lancaster County taxpayers with a better understanding of how the very law-enforcement entities they fund operate."

Lehman asked McCarthy to bring a proposal for full decryption to the associations meeting next month, so that the commissioners can vote on the matter at the first meeting in August.

Subscribe today for only $2

' + submsgtxthtml + '

Get unlimited access to breaking news, ancestry archives, our daily E-newspaper, games and more.

Subscribe today for only $2

' + submsgtxthtml + '

Get unlimited access to breaking news, ancestry archives, our daily E-newspaper, games and more.

Subscribe today for only $2

' + submsgtxthtml + '

Get unlimited access to breaking news, ancestry archives, our daily E-newspaper, games and more.

Subscribe today for only $2

' + submsgtxthtml + '

More:
What are police talking about on their encrypted radios? The public may soon find out [update] - LancasterOnline