The Real Benefits of Integrating Blockchain Tech to Secure Your Digital Data & Transactions – News & Features

The safety of data and online transactions has always been of paramount importance, especially in todays digital ecosystem. The internet is already facing numerous fraud cases across the digital ecosystem, with countless numbers of hackers regularly breaching systems.

The prevailing cybersecurity risks have put individuals and organizations reputations at stake, as the data collected from these hacking activities is misused for further fraudulent acts.

With everything now going digital and becoming vulnerable to hacking, one big question is whether it is possible to build a secured system online?

The answer to that question is yes, it's possible to build secured systems onlinewith Blockchain.

But before trusting and saving our precious data on Blockchains, lets understand what the technology really is about.

Many confidential data and information are still stored in e-formats, using a centralized database maintained on servers in a particular physical location. However, newer, more secure methods of storing confidential data and transactional information make use of a distributed ledger, which is essentially a shared database that exists across various computers on a peer-to-peer network.

Blockchain is a peer-to-peer network of distributed ledgers containing a growing list of data and transactional records, called blocks, that are linked using cryptography, which is a method of protecting information and communications through the use of codes, so that only authorized persons can read and process it. This means the list of records are secure on a Blockchain.

The transactions and data in a Blockchain, after a specific time period, get grouped in the form of a block that contains a timestamp and is further encrypted and stored in a decentralized database. This makes sure that the security, accuracy and authenticity of the data is intact and every block in the chain has a copy/timestamp of modifications.

Ultimately, the intended purpose of Blockchain, the revolutionary record-keeping technology, is to bring transparency, security, and decentralization in the storage and maintenance of data.

Photo/Unsplash

There are at least three major reasons behind using this revolutionary technology:

Before Bitcoin and BitTorrent came together, people were used to centralized services. The idea is very simple: You have a unified entity that saves records and youd have to interact with one entity to get any of that data you required.

For example, when you search for something on Google, you send a query to the server which returns search results with the requested data. However, this data has several vulnerabilities:

In a decentralized system using Blockchain, however, information is shared with everyone in the network and they own it. It is not stored in a single centralized spot thats easier to target. That means the entire data cannot be affected all at once, which makes the data more secure.

With regard to Blockchain, immutability means the data, once entered in the system, cannot be fiddled with. This has proven very beneficial in many sectors, such as financial institutions and FinTech startups.

If you think about it, how many fraud cases could have been stopped if people just knew that the vital companys data that they were looking to fiddle with was out of their bounds.

Blockchain is a connected list or records containing data and a hash pointer. A hash pointer is like a typical pointer, but instead of just containing the address of the previous block, it also contains the hash of the data inside the previous block.

Hashing means taking an input string of any length and giving out an output of a fixed length. Attempting any small change in any of the data will change the hash functions drastically. This is exactly how Blockchain system are ensuring immutability.

Today, transparency is a concept that has been misunderstood by many. Why is that so?

Well, all the identifying information of a person is encrypted and safeguarded by complex cryptography, which is denoted only by their public address. For example, if you wanted to see anyones transaction record, you will not see as Mark sent 5 BTC, instead you will see it as 1MF1bhsPBkBzzz9vpFYEmvwT2TbyCt7NZJ sent 5 BTC.

Hence, even if the persons real identity is hidden, you can still see the records that were done by their public address. This is a unique feature of transparency within a financial system. And this kind of encryption helps financial institutions safely demonstrate their transparency.

With the application of blockchain and cryptocurrency technology, you can easily check the transactions of any institution via their public address. This has forced complete truthfulness from big institutions, which was previously not possible and they never dealt with before.

Photo: Wikimedia commons.

Some real benefits for this technology are:

Blockchain technology eliminates the involvement of third parties for processing or verifying transactions. The technology is actually helping in securing clients data in digital format.

For example, several online background verification companies are leveraging Blockchain technology to mitigate security breaches, effective utilization to prevent frauds, and allow easy verification of personal documents.

As already mentioned, the technology uses a hash function. This function works by creating a fixed length of alphanumeric characters irrespective of the actual file size. The character limit is 256-bits long, which means its possible to verify the authenticity of data and documents.

With Blockchain technology, a participant will need to verify as a genuine user only once in the network that they do transactions and not every time. This leads to quicker, smoother and more trustworthy transactions between users as every member is verified.

The hash sequence for every input is different and unique and it stores the details of exact time and date of transactions, with every detail of verification done on that record. As mentioned before, any change in the input will completely produce a different hash.

Compared to the old and time-consuming verification methods, Blockchain acts as a new dawn to the verification industry. Blockchain brings in more innovative, fast, and efficient ways to get the verification done, leading to time consumption moving from hours to merely minutes.

Blockchain gives the member options to securely show their data as per the existing needs and requirements. This gives individuals managing personal data of organizations more flexibility.

Moreover, not only is there transparency in the use of the technology, but also the privacy of personal data that a user does not want to share is also taken care of.

With this technology, a user can prove their authenticity without having to disclose their sensitive data and information, or providing any identifying documents to prove their identity.

Simply doing some tasks within Blockchain systems and networks that the person is able to do only if they are who they claim to be can verify a persons identity. Otherwise, failing to complete the task will lead to automatic rejection of their identity.

This concept is called Zero knowledge proof (ZKP) and it is very effective for authentication purposes, while assuring the privacy of personal data.

Given that the current market is characterized by stiff competition, adopting the revolutionary Blockchain technology in your business can give you a marked edge over the competition.

A Blockchain-based identity verification system, for example, can offer an efficient method for businesses to manage and verify details of job seekers, workers, and even clients in the business. The verified profiles not only build trust among business partners and stakeholders, but also remove the need for intervention of external background verification agencies.

Blockchain powered systems utilizes a decentralized repository of distributed ledgers for storing validated data that cannot be tampered with without it being noticed. The systems effectively enable a hybrid approach with their state-of-the-art technology that includes a Blockchain secured database and an easily verifiable and shareable data management system.

See the article here:
The Real Benefits of Integrating Blockchain Tech to Secure Your Digital Data & Transactions - News & Features

Commentary: Mobile app security in the midst of a pandemic – Chain Store Age

Facing the COVID-19 pandemic and subsequent lockdown, major retailers have had to depend more heavily on mobile apps to stay connected to customers and keep business moving.

For example, many coffee shops, restaurants and grocery stores are asking customers to make orders for pickup through their or food delivery mobile apps, and those stores whose physical locations are completely shuttered depend entirely on mobile apps to keep generating revenue.

In this rush to add new functionality and update mobile apps, improving the security posture of an app can no longer be overlooked. Cybercriminals are taking advantage of the pandemic and peoples increased reliance on mobile apps. A recent COVID-19 tracking app, for example, turned out to be ransomware.

Where should organizations start to improve mobile app security? Here are the broad areas that require the most attention:

Secure Data StorageIn many apps, sensitive data and personally identifiable information (PII) such as credit card numbers, passwords and other valuable information are stored in the clear. This data can be stored in different locations, including the apps sandbox, the in-app preferences, strings and resources.

This means that anyone who can gain unauthorized access to the app can read the data stored by it. Thieves are most interested in the data a phone stores, because it is much more valuable for the purpose of credential theft and fraud than is the phone itself.

To protect the data on a device, it must be encrypted. That way, even if a device is stolen or compromised, the data will be useless gibberish without the encryption key necessary to decode it. The cryptography employed should be at least as strong as the Advanced Encryption Standard using encryption keys that are 256 bits in length, known as AES-256 encryption.

Secure communicationsFor a retailers mobile app to be useful, it has to communicate via the Internet with other services, and those communications must be protected. Otherwise, mobile apps can fall prey to man-in-the-middle (MitM) attacks, in which a cybercriminal intercepts communications between a mobile user and the server theyre trying to reach. If successful, attackers can steal sensitive data and even change information to do things such as inject malware into the app.

To protect against MitM attacks, apps must enforce secure communications using transport layer security (TLS) and properly enforce security certificates, which verify the identity of the server to which the mobile app is connecting.

Protect against tampering and reverse engineeringApp makers also have to be concerned with the underlying code and intellectual property of their apps. Most are not protected against attempts to tamper, debug and reverse engineer apps a set of capabilities often referred to as app shielding.

Levels of protection vary widely, with some hackers being able to turn off these protections. This allows bad actors to create malicious apps that look and feel like the real app. They can then distribute these apps to unsuspecting users and wreak havoc.

Another important protection layer is code obfuscation, the process of modifying an executable so that it is no longer useful to a hacker but remains fully functional. When combined with app shielding, these two measures provide powerful protection for mobile apps.

These measures can take a great deal of time, expense and specialized skills to implement, which poses serious problems for development teams, who need to release apps quickly, especially during a crisis such as this one. As a result, many organizations choose to release apps that are vulnerable.

Thankfully, businesses dont have solely rely on manual implementation methods, as automated, AI-powered platforms now exist that can implement all of these security measures in minutes without any coding at all.

As businesses depend more and more on their mobile apps, its critical to ensure the security of both the app and its users. By implementing secure data storage, secure communications and anti-tampering measures, businesses protect both its customers and company from malicious attacks.

Tom Tovar is the CEO and co-creator of Appdome.

Read the original here:
Commentary: Mobile app security in the midst of a pandemic - Chain Store Age

Kerry Emanuel, David Sabatini, and Peter Shor receive BBVA Frontiers of Knowledge awards – MIT News

The BBVA Foundation awarded three MIT professors Frontiers of Knowledge Awards for their work in climate change, biology and biomedicine, and quantum computation. Department of Earth, Atmospheric, and Planetary Sciences Professor Kerry A. Emanuel, Department of Biology Professor David Sabatini, and Department of Mathematics Professor Peter Shor were recognized in the 12th edition of this annual award.

Kerry Emanuel

Emanuel, the Cecil and Ida Green Professor of Atmospheric Science, earned the BBVAs Climate Change award for his fundamental contributions to the understanding of tropical cyclones and how they are affected by climate change, according to the committees citation. By understanding the essential physics of atmospheric convection he has unraveled the behavior of tropical cyclones hurricanes and typhoons as our climate changes. He was also lauded for extraordinary effectiveness in communicating the science of climate change to the public and policymakers.

Emanuel is the co-founder (with Daniel H. Rothman) and co-director of the MIT Lorenz Center, a climate think tank that fosters creative approaches to learning how climate works. He was the first to link greater hurricane intensity to climate change-induced warming of sea surface waters.

It is hard to imagine an area of climate science where one persons leadership is so incontestable, says Bjorn Stevens, BBVA Foundation committee chairman and director of the Max Planck Institute for Meteorology.

Hurricanes have long been known as destructive natural events, but the underlying physics of them was still largely unknown. Throughout the 1980s and 1990s, after completing degrees at MIT and later joining the EAPS faculty, Emanuel pinned down the mechanisms behind hurricanes. In his research detailing how warming surface oceans fuel storms and increase the intensity, he called them massive, natural machines that convert the heat they extract from the ocean into wind energy.

A changing climate will see more powerful hurricanes. Emanuel warns that this will complicate the already-tough task of making accurate forecasts, and predicts that hurricanes will spread into more regions of the planet.

His models currently predict a 5 percent increase in hurricane intensity (i.e., wind speed) for each 1-degree rise in ocean temperatures. Three degrees of warming would makehurricanes 15 percent more intense, but their destructive potential would actually triple; in other words, with this15percent increasein wind speed, thedamage would increase by around 45 percent, says Emanuel, the author of "Divine Wind: The History and Science of Hurricanes" (Oxford Unviersity Press, 2005) and "What We Know about Climate Change" (MIT Press, 2018).

Todays most intense hurricanes may have a wind speed at the surface of 85 meters per second, but by the end of this century, unless we curb greenhouse gas emissions, we could start to see speeds of up to 90-92 meters per second. A hurricanes destructive potential is determined by its wind speed, so in fact, the destructiveness of these storms for human populations would be considerably greater.

Emanuel says that the international community is not doing nearly enough to combat climate change. We need to stop listening to the voices of denial, and instead listen to our own children, who are crying out for us to act.

David Sabatini

Sabatini, an MIT professor of biology and member of the Whitehead Institute for Biomedical Research and the Koch Institute for Integrative Cancer Research, shares his Frontiers of Knowledge Award in Biology and Biomedicine with Michael Hall of the University of Basel, for the discovery of a protein kinase that regulates cellular metabolism and growth.

Their discovery of mTOR is used in the study of a wide array of health conditions, including obesity, aging, cancer, diabetes, epilepsy, Alzheimers, and Parkinsons. Research has suggested that 60 percent of cancers have some mechanism for turning on the mTOR pathway, Sabatini says. I could never have imagined the implications of that first discovery.

Sabatini began his PhD thesis on understanding the mechanism of action of rapamycin, a natural anti-fungal agent proved to have immunosuppressive and anti-cancer properties. It is used to prevent organ rejection in transplant patients.

The two scientists arrived at their findings independently. Hall discovered the target of rapamycin (TOR) protein in yeast cells in 1993 during his time as a senior investigator; Sabatini isolated it in mammals while still a doctoral student, in 1994, and gave it the name mTOR.

In mammalian cells, mTOR which stands for mechanistic target of rapamycin, an immunosuppressant drug that inhibits cell growth is the keystone molecule in a pathway that regulates cellular metabolic processes in response to nutrients.

Sabatini explains that mTOR is a switch that turns on in the presence of nutrients, so the body can build material, and when there are no nutrients available it breaks the material down. The on/off switch of the mTOR switch controls a cascade of hundreds of molecular signals, many of which are still unknown to science.

The molecular mechanisms that regulate the growth of organisms and coordinate it with the availability of nutrients were unknown until two decades ago, said the committee.

After the molecule was isolated in yeast and mammals, both researchers began the task of unraveling its multiple organismal functions. Sabatinis lab has since identified most of the components of the mTOR pathway and shown how they contribute to the function of cells and organisms. His discoveries have opened avenues for identifying disease vulnerabilities and treatment targets for diverse conditions notably including key metabolic vulnerabilities in pancreatic and ovarian cancer cells and neurodevelopmental defects. He is currently working to exploit those vulnerabilities as targets for new therapies.

Rapamycin is used as an immunosuppressant to prevent rejection of transplanted organs and as an anti-cancer agent. In the treatment of cardiovascular diseases, it is used as a coating for coronary stents to stop new blockages forming in the bloodstream.

Because mTOR is a nutrient sensor, additional research points to caloric restriction for increasing longevity. TOR was the first known protein that influences longevity in all of the four species that scientists commonly use to study aging: yeast, worms, flies, and mice. We are just scratching the surface of possible mTOR applications, he says. I dont know if it will help us live to be 120, but I think it will have beneficial effects on different physiological systems, and I am practically sure that it will ameliorate aspects of aging-related diseases.

Peter Shor

Shor, the Morss Professor of Applied Mathematics, was recognized in the Basic Sciences category for his role in the development of quantum computation and cryptology. He shares this award with IBM Researchs chemical physicist Charles H. Bennett and University of Montreal computer scientist Gilles Brassard.

The award committeeremarked on the leap forward in quantum technologies, an advance that draws heavily on the new laureates pioneering contributions. The committee stated that their work spans multiple disciplines and brings together concepts from mathematics, physics, and computer science. Their ideas are playing a key role in the development of quantum technologies for communication and computation.

Bennett and Brassard invented quantum cryptography in the 1980s to ensure the physical inviolability of data communications. The importance of this work became apparent 10 years later when Shor discovered that a hypothetical quantum computer would render effectively useless the conventional cryptography systems underpinning the privacy and security of todays internet communications.

Bennett and Brassards BB84 protocol generally acknowledged as the first practical application of the science of quantum information underpins the security of all our internet communications and transactions, and is based on the existence of mathematical problems that computers cannot solve. Until, as the citation states, Shor discovered that quantum computers could factorize integers much faster than any supercomputer, therefore compromising the security of conventional cryptographic schemes.

Says Brassard, The importance of our work became much more evident after Shor destroyed everything else. Shors Algorithm is now one of the quantum algorithms that comprise the fast-developing language to be spoken by tomorrows quantum computers.

Another of Shors contributions is an algorithm used to correct quantum computer errors, an essential requirement for enabling and scaling quantum computations, the committee wrote.

Quantum computers are exposed to a large volume of noise, causing numerous errors. Everyone thought that you couldnt correct errors on quantum computers, recalls Shor, because as soon as you try to measure a quantum system you disturb it. In other words, if you try to measure the error so as to correct it, you disturb it and computation is interrupted. My algorithm showed that you can isolate and fix the error and still preserve the computation.

Quantum cryptography is one of the most advanced branches of quantum technology, which the laureates view as a long-term prospect. It will be five or 10 years before a quantum computer can do anything approaching useful, says Shor. With time, however, he is convinced that these machines will deliver revolutionary applications. For example, in biomedicine, it takes enormous amounts of computer time to simulate the behavior of molecules, he says. But quantum computers could achieve that, and help design new drugs.

The BBVA Foundation promotes knowledge based on research and artistic and cultural creation, and supports activity on the analysis of emerging issues in five strategic areas: environment, biomedicine and health, economy and society, basic sciences and technology, and culture. The Frontiers of Knowledge Awards, spanning eight prize categories, recognize research and creative work of excellence as embedded in theoretical advances, technological developments, or innovative artistic works and styles, as well as fundamental contributions in addressing key challenges of the 21st century.

Since its launch in 2009, the BBVA also has given awards to MITs Susan Solomon for climate change; Marvin Minsky, Adi Shamir,Silvio Micali,Shafi Goldwasser, and Ronald Rivest for information and computer technologies; Stephen Buchwald for basic sciences; Edward Boyden for biology and biomedicine; and Daron Acemoglu for economics.

See the rest here:
Kerry Emanuel, David Sabatini, and Peter Shor receive BBVA Frontiers of Knowledge awards - MIT News

Assange’s US extradition, Threat to Future of Internet and Democracy – CounterPunch

Drawing by Nathaniel St. Clair

On Monday May 4, the British Court decided that the extradition hearing for WikiLeaks publisher Julian Assange, scheduled for May 18, would be moved to September. This four month delay was made after Assanges defense lawyer argued the difficulty of his receiving a fair hearing due to restrictions posed by the Covid-19 lockdown. Mondays hearing at Westminster Magistrates Court proceeded without enabling the phone link for press and observers waiting on the line, and without Assange who was not well enough to appear via videolink.

Sunday May 3rd marked World Press Freedom Day. As people around the globe celebrated with online debates and workshops, Assange was being held on remand in Londons Belmarsh prison for publishing classified documents which exposed US war crimes in Iraq and Afghanistan. On this day, annually observed by the United Nations to remind the governments of the importance of free press, Amnesty International renewed its call for the US to drop the charges against this imprisoned journalist.

The US case to extradite Assange is one of the most important press freedom cases of this century. The indictment against him under the Espionage Act is an unprecedented attack on journalism. This is a war on free speech that has escalated in recent years turning the Internet into a battleground.

Privatized censorship

While he was living in the Ecuadorian embassy in London, after being granted asylum in 2012, Assange alerted the public about the oppressive force that is now threatening press freedom around the world. In a statement that was read during the Organizing Resistance to Internet Censorship webinar in January 2018, Assange noted how multinational tech companies like Google and Facebook have evolved into powerful digital superstates. He warned that undetectable mass social influence powered by artificial intelligence is an existential threat to humanity.

Most who care about digital rights are well aware that tech giants like Google and Facebook have long been embroiled with Washington halls of power. Mark Zuckerberg, co-founder, chairman and CEO of Facebook has been candid about his pro-censorship stance. In his 2019 Washington Post op-ed Zuckerberg shared his belief that Facebook, the worlds largest social networking site with more than 800 million users, should take an active role to control content for governments.

In When Google Met WikiLeaks, published in 2014, Assange exposed the way Google executives used revolving doors within the US State Department, and highlighted their close ties to US intelligence agencies like the NSA. Googles internal research presentation, leaked to Breitbart News from the companys employees in 2018, revealed government requests for censorship have tripled since 2016. An 85-page briefing entitled The Good Censor concluded that the multinational search giant needs to move toward censorship if it wishes to continue to receive the support of national governments and continue its global expansion.

Google has been accused of discriminating against conservative viewpoints and suppressing free speech. YouTube, one of Googles subsidiaries, is now censoring the WikiLeaks Collateral Murder video. Real images of war that exposed the US militarys brutal killing of innocent Iraq civilians, including two Reuters journalists, is now assigned to the inappropriate for some users category, severely compromising its viewership. Meanwhile, the many millions of YouTube videos, of which tens of thousands depict violence, are allowed to be played without restriction.

Big Techs fight against misinformation

Now, amidst the ongoing Covid-19 pandemic, this privatized censorship via a monopoly on information became more overt and even normalized. On March 11, after the White House asked Big Tech for help in fighting the spread of false information about Covid-19, top tech industry players including Facebook, Google, LinkedIn, Microsoft, and Twitter and Reddit issued a joint statement on their collaborative efforts to battle against disinformation on their platforms.

As measures to quell the spread of inaccurate information and harmful content, Facebook implemented a new policy to direct users who have interacted with posts that contain harmful coronavirus misinformation to a myth busters page, maintained by the World Health Organization (WHO). In setting forth this companys new aggressive move to counter misinformation about Covid-19, Guy Rosen, Facebooks vice-president of integrity commented in a blogpost:

We want to connect people who may have interacted with harmful misinformation about the virus with the truth from authoritative sources in case they see or hear these claims again off of Facebook.

Google CEO Sundar Pichai also announced that the company is partnering with the US government in developing a website to educate about COVID-19 and provide resources nationwide. The blog post indicated that the multinational search giant would work under the guidance of the WHO and the Centers for Disease Control (CDC).

Silencing the voices of dissent

Since it declared a global pandemic on March 11, 2020, the World Health Organization positioned itself as a source of legitimacy, setting guidelines and recommendations to direct a worldwide response to Covid-19. Narratives put forward by this Geneva-based global health body began to rapidly shape the scenery of our everyday life.

Images of emergency rooms filled with those who are infected with novel coronavirus have quickly flooded into American homes through major cable news networks. With a daily report of death count increasing everyday, fear began to spread around the world. As doctors and nurses at the frontline fight to save the lives of victims in what has now become the War on Covid-19, views that challenge the mainstream discourse on the pandemic have emerged on the Internet. Physicians who disagree with the expert opinion of WHO on the transmission of Covid-19, efficacy of its treatment and/or management of the outbreak began speaking out.

Recently a call by two Californian doctors to reopen the economy and to examine the death rate of Covid-19 and justification of lockdown, created a wide sensation, attracting both support and criticism. A news conference held by Dr. Daniel W. Erickson and Dr. Artin Massih, co-owners of Accelerated Urgent Care in Bakersfield, was livestreamed by local television stations. When the online video went viral, being viewed millions of times, YouTube pulled the plug, stating that the doctors were disputing local health authority guidance.

In the first week of May, David Icke, the former football player and author of more than 20 books, got deplatformed from Facebook and Google for posting content that questioned the motives of WHO and countered the official narratives on the threat of Covid-19. In deleting his account, YouTube stated that the 68 year old UK citizen, often labeled a professional conspiracy theorist, violated their Community Guidelines on sharing information about coronavirus. Prior to deleting his account, a video of an interview of him by London Real was deleted. That video, discussing misdiagnosis and misclassification of death and economic consequences of the lockdown, is reported to have been viewed over 30 million times.

The disciplinary actions of these digital mega corporations against those who dont conform to the edicts of the designated health authority resemble the censorship of authoritarian states such as China. In a name of public safety, efforts to widen discourse and open up a democratic debate were uniformly shut down across major media platforms. This contravention of First Amendment principles does not stop with restriction of the freedom of speech. It also abridges the right of the people to peaceably assemble, prohibiting political dissent. Facebook has now confirmed that the company, after consulting with state governments, is banning promotions for protests that violate social distancing rules.

CIAs cyber-warfare

A little over a year before his arrest inside the embassy, Assange gave a dire warning: The future of humanity is the struggle between humans that control machines and machines that control humans. In this digital age, a battle for free speech is not fought on the political ground alone with legislators, corporate lobbyists, senators and presidents. Civil liberties are being eroded by an algorithmic control dictated by the Silicon Valley tech titans. They use AI in ways that act beneath conscious awareness, manipulating reality at a speed and level that humans can no longer keep up with, to control perception.

Now, the machines seem to be out of control, fueling cyber-warfare. In 2017, WikiLeaks released the largest publication of confidential documents, code-named Vault 7, sourced from the top-secret security network at the Cyber Intelligence Center. This release revealed that the CIA had lost control of the cyber-weapons it had developed.

What is alarming is that the CIA became aware of this loss but didnt warn the public about it. Now, this horrific arsenal that was designed to hide all traces of its own actions, is loosed upon the world and can be used for malicious purposes by cyber-mafias, foreign agents, hackers, and anyone else who eventually got their hands on it.

The CIAs covert hacking program and their weaponized exploits target a wide range of U.S. and European company products. The series of documents and files categorized in Year Zero revealed the specific CIA malware that grants the agency capacity to penetrate Googles Android phone and Apples iPhone software the very software that runs (or has run) presidential Twitter accounts and to avoid or manipulate fingerprints in any subsequent forensic review. An example of the abuse of this power is found in evidence of CIA espionage, targeting French political parties and candidates in the lead up to the 2012 presidential election.

Rage against the machine

The Framers of the US Constitution believed there is a seed of corruption inherent in humans. This is why Thomas Jefferson, the principal author of Americas founding document, emphasized the vital role of a free press in keeping government power in check. He said that if he had to choose between a government without newspapers or newspapers without a government, I should not hesitate a moment to prefer the latter.

Although the social and political landscape has significantly changed since his time, fundamentals of democracy have not changed. As our society quickly moves into a 1984 Orwellian technological dystopia, Jeffersons words that alarmed a nation back then should sound more loudly now. If people care about democracy, a healthy distrust of the government must be restored, awakening moral courage to ignite our rage against the machine.

Through his work with WikiLeaks, Assange aimed to hold people who run the machine to account. As a project of free software, he created an exemplar of scientific journalism on the platform of the Internet. It provided ordinary people with a formidable tool that can help them take back their power to control the machine and end its hostile takeover of society.

The whistleblower behind WikiLeaks publication of Vault 7 (allegedly Joshua Schulte, still held in custody in New York) disclosed CIA documents in an effort to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons. In releasing the material, Assange, as editor in chief of WikiLeaks, responded to his sources call for peacemaking, by affirming the organizations role as a neutral digital Switzerland for people all over the world, to provide protection against nation-states and cyber attacks.

After the whistleblowing site carefully redacted the actual codes of CIA hacking tools, anonymized names, and email addresses that were targeted, it contacted Apple, Microsoft, Google, Mozilla, and MicroTik, stating that WikiLeaks would work with tech companies by giving them exclusive access to appropriate material so they could help create a possible antidote to the CIAs breach of security and offer countermeasures.

Existential threat to democracy

For these efforts to end the military occupation of cyberspace, Assange is now being aggressively pursued by the Trump administration. At the time when WikiLeaks released a massive trove of documents that detailed the CIA hacking tools, Vice President Mike Pence vowed to use the full force of the law to hunt down those who released the Intelligence Agencys secret material. Calling WikiLeaks a non-state hostile intelligence service that needs to be shut down, Secretary of State and former CIA director Mike Pompeo has taken on and expanded Obamas war on whistleblowers to attack the publisher.

John Kiriakou, who became the first CIA officer to give evidence of the use of torture, repeatedly said that if Assange were extradited, he would receive no fair trial. The CIA whistleblower, who was jailed for calling this torture unconstitutional, noted that in the Eastern District of Virginia where Assange was charged, juries are made up of people from the CIA, the FBI, the Pentagon, the department of Homeland security and intelligence community contractors or their family members and that no national security defendant has ever won a case there.

In his fight against extradition to the US, where he faces 175 years in prison and being subjected to harsh conditions under Special Administrative Measures, Assange is rendered defenseless. He is in effective solitary confinement, being psychologically tortured inside Londons maximum-security prison. With the British governments refusal to release him temporarily into home detention, despite his deteriorating health and weak lung condition developed as consequences of long detention, Assange is now put at risk of contracting coronavirus. This threatens his life.

Now, as the world stands still and becomes silent in our collective self-quarantine, Assanges words spoken years ago in defense of a free internet call for our attention from behind the walls of Belmarsh prison:

Nuclear war, climate change or global pandemics are existential threats that we can work through with discussion and thought. Discourse is humanitys immune system for existential threats. Diseases that infect the immune system are usually fatal. In this case, at a planetary scale.

Prosecution of WikiLeaks is an attack on the free press that is supposed to promote the discourse necessary to maintain the health of our society. A potential US extradition of Assange poses existential threats to democracy. We must fight to stop it, for without each individuals ability to speak freely, the tyranny of the authoritarian technocracy will become inevitable. It will be the extinction of free human beings everywhere in the world.

View original post here:
Assange's US extradition, Threat to Future of Internet and Democracy - CounterPunch

Help Us Cover the Julian Assange Story – Consortium News

With corporate TV and press abandoning the imprisoned WikiLeaks publisher, Consortium News has been in the forefront among alternative media in chronicling his plight. But we cant do it without you.

Assange outside UK Supreme Court in 2011. (Flickr)

Except for a brief moment after his dramatic arrest, the mainstream media has abandoned Julian Assange. They do this at their own peril.

Thats because the arrest and espionage indictment of Assange for practicing journalism is a danger to all journalists everywhere.

Consortium News started covering the Assange case on Dec. 16, 2010 with an article by founding editor Robert Parry, one of the leading investigative reporters of his generation. Bob argued that Assange was practicing journalism in the exact way that he did. He wrote:

the process for reporters obtaining classified information about crimes of state most often involves a journalist persuading some government official to break the law either by turning over classified documents or at least by talking about the secret information. There is almost always some level of conspiracy between reporter and source.

Though some elements of this suspected Assange-Manning collaboration may be technically unique because of the Internets role and that may be a relief to more traditional news organizations like the Times which has published some of the WikiLeaks documents the underlying reality is that what WikiLeaks has done is essentially the same wine of investigative journalism in a new bottle of the Internet.

By shunning WikiLeaks as some deviant journalistic hybrid, mainstream U.S. news outlets may breathe easier now but may find themselves caught up in a new legal precedent that could be applied to them later.

Since that first article, Consortium News has published more than 200 articles and 57 videos on Assange and WikiLeaks, 205 of the articles and all of the videos coming in the past two years alone. Thats because this website has recognized the historic importance of the case against Assange, which has justly been compared to the trials of John Peter Zenger and Alfred Dreyfus.

Our Assange coverage has not just scratched the surface, but has dug deeply into the meaning of the case, legally, politically and historically. We are committed to continuing this in-depth coverage of Assanges ongoing extradition ordeal at the hands of the Trump administration.

But we cant do it alone. You have an immense role to play as readers and viewers, our only source of support. Please join our team, or reaffirm your commitment to it, with a generous donation today to our 25th Anniversary Spring Fund Drive.

Here (in reverse chronological order) is the full archive of CNs stories on WikiLeaks and Assange. There are more than 200 articles on Assange in the past two years. CN Live! has produced 57 videos on the WikiLeaks publisher.

PleaseDonate Today

More:
Help Us Cover the Julian Assange Story - Consortium News

FBI Got Everything It Asked for in DNC Investigation, Refuting ‘Missing Server’ Myth – Defense One

New transcripts released by the House intelligence committee shed light on Russias interference in 2016 election.

I would like you to do us a favor, though, President Donald Trump told his Ukranian counterpart in the infamous July 2019 phone conversation that led to his impeachment. Because our country has been through a lot and Ukraine knows a lot about it. I would like you to find out what happened with this whole situation with Ukraine, they say CrowdStrike The server, they say Ukraine hasit.

Trump was only the latest to perpetuate a myth surrounding Russian hackers 2016 theft of emails from the Democratic National Committee: that the theft was an inside job, that a server mysteriously disappeared in a purported coverup. In fact, all available evidence says the theft was carried out by two groups allegedly connected to Moscows intelligence agencies: APT-28 and APT-29, aka Fancy Bear and CozyBear.

The pile of evidence grew deeper on Thursday evening, when the House Permanent Select Committee on Intelligence released more than 50 transcripts of FBI interviews conducted in 2017 and 208 under Robert Muellers investigation into Russias meddling in the 2016 election. One in particular stands out.

The interview with Yared Tamene Wolde Yohannes, who ran the DNCs IT in 2015 and 2016, reveals a few important facts. It confirms that the FBI knew that at least one Russian actor, Cozy Bear, had penetrated the DNC network by the fall of 2015 and, Yohannes suggests, possibly as far back as July. It also reveals that the FBI wasnt direct or forthcoming with DNC about what they were seeing. They asked for information without telling the DNC who really was afterthem.

Subscribe

Receive daily email updates:

Subscribe to the Defense One daily.

Be the first to receive updates.

I would say that the information that the FBI was providing, honestly, was frustrating in how redacted it was, Yohannes complains. He said the FBI agent who told him about the intrusion didnt say Russian state-sponsored actor. He said Russians in general. The FBI didnt even hand over data that could have helped Yohannes secure his network like timestamped screenshots of documents or emails or network logs until February2016.

The DNC only learned that the Russian government was targeting them in the spring of 2016, from Crowdstrike, a cybersecuritycompany.

The transcript also reveals that the DNC gave the FBI everything it asked for: roughly 15 gigabytes of server logs and related metadata showing intrusionactivity.

We eventually delivered those logs. I think the actual date that we were able to get it to the FBI was 10 days later. So like April 29, I think, was the date that we actually sent them the logs. And the FBI agent confirmed receipt by sending me a text message saying: You know, thank you for sending that. Thats great, very helpful. Ill let you know what we find, Yohannes says in thetranscript

Yohannes concludes the interview with a wish that the FBI would have shared more about what it knew was happening to theDNC.

What I would like to seeis better sharing of information at the declassified level, I mean, they do that already. They have websites, they have maybe even seminars, that kind of stuff. But these are not readily available, easily digestible, well-marketed. I would love to see, you know, a small organization like the DNC, which has a really big profile but its a really small nonprofit organization, can use that kind of assistance from the U.S. intelligence community and others, potentially, right? Yeah, so I would love to see that kind ofthing.

The transcript confirms what others have reported via anonymous sources: that the U.S. intelligence community was well aware that Russians had penetrated DNC networks longbefore the group knew it had beencompromised.

The emails were dumped to Wikileaks in the summer and fall of 2016. The IC might have announced then that the thieves were Russian, and that the theft was part of a coordinated effort to sway the upcoming election. Instead, the IC made its first formal statement on the matter on Oct. 7. That delay allowed someone to sow doubt in the publics mind about what really happened, doubt that persiststoday.

In some ways, the intelligence community appears to have learned from this failure. In July 2018, the NSA formed a group to disrupt Russian active measures aimed at the UnitedStates.

But other signs show that the Intelligence community is still not forthcoming about the attacks that the country faces. Earlier this week, The U.S. Cybersecurity and Infrastructure Security Agency and UKs National Cyber Security Centre released a joint statement saying that powerful cybercriminals were targeting healthcare organizations amid the pandemic. But officials with both organizations rebuffed repeated requests to identify who those attackers were, showing that old habits, even unhelpful ones, are hard topurge.

Read more:
FBI Got Everything It Asked for in DNC Investigation, Refuting 'Missing Server' Myth - Defense One

Archer to work alongside IBM in progressing quantum computing – ZDNet

Archer CEO Dr Mohammad Choucair and quantum technology manager Dr. Martin Fuechsle

Archer Materials has announced a new agreement with IBM which it hopes will advance quantum computing and progress work towards solutions for the greater adoption of the technology.

Joining the IBM Q Network, Archer will gain access to IBM's quantum computing expertise and resources, seeing the Sydney-based company use IBM's open-source software framework, Qiskit.

See also: Australia's ambitious plan to win the quantum race

Archer is the first Australian company that develops a quantum computing processor and hardware to join the IBM Q Network. The IBM Q Network provides access to the company's experts, developer tools, and cloud-based quantum systems through IBM Q Cloud.

"We are the first Australian company building a quantum chip to join into the global IBM Q Network as an ecosystem partner, a group of the very best organisations at the forefront of quantum computing." Archer CEO Dr Mohammad Choucair said.

"Ultimately, we want Australian businesses and consumers to be one of the first beneficiaries of this exciting technology, and now that we are collaborating with IBM, it greatly increases our chances of success".

Archer is advancing the commercial readiness of its12CQ qubit processor chip technology towards a minimum viable product.

"We look forward to working with IBM and members of the network to address the most fundamental challenges to the wide-scale adoption of quantum computing, using our potentially complementary technologies as starting points," Choucair added.

In November, Archer said it was continuing to inch towards its goal of creating a room temperature quantum computer, announcing at the time it had assembled a three qubit array.

The company said it has placed three isolated qubits on a silicon wafer with metallic control electrodes being used for measurement. Archer has previously told ZDNet it conducts measurements by doing magnetic fields sweeps at microwave frequencies.

"The arrangement of the qubits was repeatable and reproducible, thereby allowing Archer to quickly build and test working prototypes of quantum information processing devices incorporating a number of qubits; individual qubits; or a combination of both, which is necessary to meet Archer's aim of building a chip for a practical quantum computer," the company said.

In August, the company said it hadassembled its first room-temperature quantum bit.

Archer is building chip prototypes at the Research and Prototype Foundry out of the University of Sydney's AU$150 million Sydney Nanoscience Hub.

2020s are the decade of commercial quantum computing, says IBM

IBM spent a great deal of time showing off its quantum-computing achievements at CES, but the technology is still in its very early stages.

What is quantum computing? Understanding the how, why and when of quantum computers

There are working machines today that perform some small part of what a full quantum computer may eventually do. But what are the real-world applications for quantum computing?

Quantum computing has arrived, but we still don't really know what to do with it

Even for a technology that makes a virtue of uncertainty, where quantum goes next is something of a mystery.

Quantum computing: Myths v. Realities (TechRepublic)

Futurist Isaac Arthur explains why quantum computing is a lot more complicated than classical computing.

See the original post here:
Archer to work alongside IBM in progressing quantum computing - ZDNet

Quantum Computing Market New Technology Innovations, Advancements and Global Development Analysis 2020 to 2025 – Cole of Duty

The reportQuantum Computing Marketprovides a unique tool for evaluating the Market, highlighting opportunities, and supporting strategic and tactical decision-making. This report recognizes that in this rapidly-evolving and competitive environment, up-to-date marketing information is essential to monitor performance and make critical decisions for growth and profitability. It provides information on trends and developments, and focuses on markets capacities and on the changing structure of the Quantum Computing.

Make an Inquiry about this report:

https://www.marketinsightsreports.com/reports/06211315651/global-quantum-computing-market-size-status-and-forecast-2019-2025/inquiry?source=coleofduty&Mode=48

Quantum computing is to develop advanced computer technology based on quantum mechanics and quantum theory. Quantum computers have been used for quantum computing that follows the concept of quantum physics. Quantum computing differs from classical computing in terms of speed, bits and data. Classical computing using two bits simply referred to as 0 and 1, while the use of quantum computing all the states in between 0 and 1, which helps in better results and higher speeds. Quantum computing has been used mostly in research to compare different solutions and find an optimal solution to a complex problem and has been used in sectors such as chemicals, utilities, defense, health and medicine and a variety of other sectors. quantum computing is used for applications such as cryptography, machine learning, algorithms, quantum simulation, quantum parallelism and others on the basis of the qubit technologies like super do qubits, qubit-qubit ion is trapped and semiconductors.

Top Companies in the Global Quantum Computing Market: D-Wave Systems, 1QB Information Technologies, QxBranch LLC, QC Ware Corp, Research at Google-Google

Segmentation on the basis of Types:

SimulationOptimizationSampling

Segmentation on the basis of Applications:

DefenseBanking & FinanceEnergy & PowerChemicalsHealthcare & Pharmaceuticals

Inquire for Discount:

https://www.marketinsightsreports.com/reports/06211315651/global-quantum-computing-market-size-status-and-forecast-2019-2025/discount?source=coleofduty&Mode=48

Influence of the Quantum Computing Market report:

-Comprehensive assessment of all opportunities and risk in the Quantum Computing Market.

-Quantum Computing Market recent innovations and major events.

-Detailed study of business strategies for growth of the Quantum Computing Market-leading players.

-Conclusive study about the growth plot of Quantum Computing Market for forthcoming years.

-In-depth understanding of Quantum Computing Market-particular drivers, constraints and major micro markets.

-Favourable impression inside vital technological and market latest trends striking the Quantum Computing Market.

Types of SWOT analysis market research that are offered in Quantum Computing Market Research are as follows:

SWOT ANALYSIS BUSINESS REPORTS:

Our Quantum Computing market report provides an overview of the market strategic situation by amassing an independent and unbiased assessment of internal strengths and weaknesses in contrast to an in-depth analysis of external threats and opportunities.

FINANCE SWOT INVESTIGATION:

Our Quantum Computing market report analyzes both-outer and inside value related components that are affecting your organization. Inner angles incorporate provider installment terms, liquidity bottlenecks and income swings; though the outer elements incorporate loan fee changes, Quantum Computing market unpredictability just as securities exchange dangers and so forth.

SWOT ANALYSIS INDUSTRY REPORTS:

Our Quantum Computing market report includes a thorough examination of strength, weakness, opportunities, and threats of an industry. It includes Quantum Computing industry-specific trends, key drivers, constraints, entry limitations, management, competition, etc.

TECHNOLOGY SWOT ANALYSIS REPORTS:

This Quantum Computing market report contains an analysis of internal technological elements like the IT infrastructure, convenient technology, technological specialists and exterior characteristics such as trends, consumer achievement as well as new technological developments.

SWOT ANALYSIS MARKETING REPORT:

This includes evaluation of internal marketing factors marketing professionals, branch locations and marketing funds, and examination of external elements like an opponent, economic conditions and changes in brand/ demand recognition, etc.

Request for PDF Brochure:

https://www.marketinsightsreports.com/reports/06211315651/global-quantum-computing-market-size-status-and-forecast-2019-2025?source=coleofduty&Mode=48

In conclusion, Quantum Computing market report presents the descriptive analysis of the parent market supported elite players, present, past and artistic movement information which is able to function a profitable guide for all the Quantum Computing Industry business competitors. Our expert research analysts team has been trained to provide in-depth market research report from every individual sector which will be helpful to understand the industry data in the most precise way.

Note: All the reports that we list have been tracking the impact of COVID-19. Both upstream and downstream of the entire supply chain has been accounted for while doing this. Also, where possible, we will provide an additional COVID-19 update supplement/report to the report in Q3, please check for with the sales team.

We Also Offer Customization on report based on specific client Requirement:

Free country Level analysis for any 5 countries of your choice.

Free Competitive analysis of any 5 key market players.

Free 40 analyst hours to cover any other data point.

About Us:

MarketInsightsReports provides syndicated market research on industry verticals including Healthcare, Information and Communication Technology (ICT), Technology and Media, Chemicals, Materials, Energy, Heavy Industry, etc. MarketInsightsReports provides global and regional market intelligence coverage, a 360-degree market view which includes statistical forecasts, competitive landscape, detailed segmentation, key trends, and strategic recommendations.

Contact Us:

Irfan Tamboli (Head of Sales) Market Insights Reports

Phone: + 1704 266 3234 | +91-750-707-8687

[emailprotected] | [emailprotected]

Visit link:
Quantum Computing Market New Technology Innovations, Advancements and Global Development Analysis 2020 to 2025 - Cole of Duty

QUANTUM COMPUTING INC. : Entry into a Material Definitive Agreement, Creation of a Direct Financial Obligation or an Obligation under an Off-Balance…

Item 1.01 Entry into a Material Definitive Agreement.

On May 6, 2020, Quantum Computing Inc. (the "Company") executed an unsecuredpromissory note (the "Note") with BB&T/Truist Bank N.A. to evidence a loan tothe Company in the amount of $218,371 (the "Loan") under the Paycheck ProtectionProgram (the "PPP") established under the Coronavirus Aid, Relief, and EconomicSecurity Act (the "CARES Act"), administered by the U.S. Small BusinessAdministration (the "SBA").

In accordance with the requirements of the CARES Act, the Company expects to usethe proceeds from the Loan exclusively for qualified expenses under the PPP,including payroll costs, mortgage interest, rent and utility costs. Interestwill accrue on the outstanding balance of the Note at a rate of 1.00% per annum.The Company expects to apply for forgiveness of up to the entire amount of theNote. Notwithstanding the Company's eligibility to apply for forgiveness, noassurance can be given that the Company will obtain forgiveness of all or anyportion of the amounts due under the Note. The amount of forgiveness under theNote is calculated in accordance with the requirements of the PPP, including theprovisions of Section 1106 of the CARES Act, subject to limitations and ongoingrule-making by the SBA and the maintenance of employee and compensation levels.

Subject to any forgiveness granted under the PPP, the Note is scheduled tomature two years from the date of first disbursement under the Note. The Notemay be prepaid at any time prior to maturity with no prepayment penalties. TheNote provides for customary events of default, including, among others, thoserelating to failure to make payments, bankruptcy, and significant changes inownership. The occurrence of an event of default may result in the requiredimmediate repayment of all amounts outstanding and/or filing suit and obtainingjudgment against the Company. The Company's obligations under the Note are notsecured by any collateral or personal guarantees.

Item 2.03 Creation of Direct Financial Obligation or an Obligation under an

The discussion of the Loan set forth in Item 1.01 of this Current Report on Form8-K is incorporated in this Item 2.03 by reference.

Item 9.01. Financial Statements and Exhibits.

Edgar Online, source Glimpses

Link:
QUANTUM COMPUTING INC. : Entry into a Material Definitive Agreement, Creation of a Direct Financial Obligation or an Obligation under an Off-Balance...

The pandemic and national security go hand-in-hand for Nebraska’s Ben Sasse – KETV Omaha

What Ben Sasse sees out of China from his seat on the Senate Intelligence Committee scares him, and he's convinced Americans aren't taking the threat seriously."China is the biggest long-term threat," the Nebraska Republican said during a KETV NewsWatch 7 interview from Capitol Hill. "There isn't enough urgency or agreement about that problem."Over the past few years, the Chinese government has flexed its growing military and economic might with countries across the Pacific Ocean. It's made substantial investments in 5G technology, and one of its biggest tech manufacturers, Huawei, supplies those networks around the globe.Hauwei has drawn scrutiny from U.S. national security experts for its ties to the Chinese government.Sasse explained 5G technology allows more advanced uses for artificial intelligence, and ultimately quantum computing.Once deployed, effective quantum algorithms can enable machine learning. In the hands of an adversary, the development could allow computers to break codes with little effort, revealing U.S. intelligence assets."The Chinese communist party cannot beat us in the long-term tech race, and right now they are closing on us really fast," Sasse said.In the video above, watch Sen. Ben Sasse, R-Neb., question President Trump's nominee for Director of National Intelligence on Chinese government initiatives during a Senate hearing May 5.The national security implications also play out in pandemics, Sasse said, citing years of drills at the Pentagon."Most of those exercises said a pandemic would be the biggest problem," he said.The pandemic finally arrived in the form of COVID-19, and the U.S. government was left scrambling to contain it.Sasse says it's time to get serious about investing in health preparedness. The self-described "small government guy" wants more serious federal investment in vaccine accelerator programs and a "Shark Tank" for therapeutics."We need to have more red team, blue team, green team exercises inside the public health space, the vaccine development space," Sasse said.While public health experts try to contain the virus, it has already wrecked havoc across the world's biggest economy.As coronavirus closures crippled the U.S., Congress spent more than $3 trillion to rescue American businesses and the American people. More than 33 million Americans lost their jobs since the pandemic began."The average small business has about 16 days of cash on hand, and this thing has been going on for a couple of months," Sasse said. "So there's a lot more that needs to be done."The American people would seem to agree.Three quarters of Americans in swing states want sustained, direct payments during the coronavirus pandemic, according to a poll published Wednesday by CNBC. But before he signs off on more relief, Sasse wants to see what's working and what's not."Congress and the executive branch have spent way too much of the next generation's money without knowing whether it's going to be effective," he said. "So we need to start evaluating what we've already started to do before people start advocating to spread more money out of helicopters."Sasse also wants to see COVID-19 legal shields for health care workers and small businesses.He told KETV NewsWatch 7 he's open to spending money on data-driven job re-training programs that can get Nebraskans back to work.While those efforts are short-term efforts to rescue the economy, Sasse said the U.S. can't afford to forget the long-term challenges.Investing in robust efforts to shore up global health preparedness are critical, he said. Especially when he considers the China threat."They want to dominate the globe from a national security standpoint," said Sasse. "And viruses are one of many tools they might consider using."

What Ben Sasse sees out of China from his seat on the Senate Intelligence Committee scares him, and he's convinced Americans aren't taking the threat seriously.

"China is the biggest long-term threat," the Nebraska Republican said during a KETV NewsWatch 7 interview from Capitol Hill. "There isn't enough urgency or agreement about that problem."

Over the past few years, the Chinese government has flexed its growing military and economic might with countries across the Pacific Ocean. It's made substantial investments in 5G technology, and one of its biggest tech manufacturers, Huawei, supplies those networks around the globe.

Hauwei has drawn scrutiny from U.S. national security experts for its ties to the Chinese government.

Sasse explained 5G technology allows more advanced uses for artificial intelligence, and ultimately quantum computing.

Once deployed, effective quantum algorithms can enable machine learning. In the hands of an adversary, the development could allow computers to break codes with little effort, revealing U.S. intelligence assets.

"The Chinese communist party cannot beat us in the long-term tech race, and right now they are closing on us really fast," Sasse said.

In the video above, watch Sen. Ben Sasse, R-Neb., question President Trump's nominee for Director of National Intelligence on Chinese government initiatives during a Senate hearing May 5.

The national security implications also play out in pandemics, Sasse said, citing years of drills at the Pentagon.

"Most of those exercises said a pandemic would be the biggest problem," he said.

The pandemic finally arrived in the form of COVID-19, and the U.S. government was left scrambling to contain it.

Sasse says it's time to get serious about investing in health preparedness. The self-described "small government guy" wants more serious federal investment in vaccine accelerator programs and a "Shark Tank" for therapeutics.

"We need to have more red team, blue team, green team exercises inside the public health space, the vaccine development space," Sasse said.

While public health experts try to contain the virus, it has already wrecked havoc across the world's biggest economy.

As coronavirus closures crippled the U.S., Congress spent more than $3 trillion to rescue American businesses and the American people. More than 33 million Americans lost their jobs since the pandemic began.

"The average small business has about 16 days of cash on hand, and this thing has been going on for a couple of months," Sasse said. "So there's a lot more that needs to be done."

The American people would seem to agree.

Three quarters of Americans in swing states want sustained, direct payments during the coronavirus pandemic, according to a poll published Wednesday by CNBC.

But before he signs off on more relief, Sasse wants to see what's working and what's not.

"Congress and the executive branch have spent way too much of the next generation's money without knowing whether it's going to be effective," he said. "So we need to start evaluating what we've already started to do before people start advocating to spread more money out of helicopters."

Sasse also wants to see COVID-19 legal shields for health care workers and small businesses.

He told KETV NewsWatch 7 he's open to spending money on data-driven job re-training programs that can get Nebraskans back to work.

While those efforts are short-term efforts to rescue the economy, Sasse said the U.S. can't afford to forget the long-term challenges.

Investing in robust efforts to shore up global health preparedness are critical, he said. Especially when he considers the China threat.

"They want to dominate the globe from a national security standpoint," said Sasse. "And viruses are one of many tools they might consider using."

Excerpt from:
The pandemic and national security go hand-in-hand for Nebraska's Ben Sasse - KETV Omaha