How to Train Your AI Soldier Robots (and the Humans Who Command Them) – War on the Rocks

Editors Note: This article was submitted in response to thecall for ideas issued by the co-chairs of the National Security Commission on Artificial Intelligence, Eric Schmidt and Robert Work. It addresses the third question (part a.), which asks how institutions, organizational structures, and infrastructure will affect AI development, and will artificial intelligence require the development of new institutions or changes to existing institutions.

Artificial intelligence (AI) is often portrayed as a single omnipotent force the computer as God. Often the AI is evil, or at least misguided. According to Hollywood, humans can outwit the computer (2001: A Space Odyssey), reason with it (Wargames), blow it up (Star Wars: The Phantom Menace), or be defeated by it (Dr. Strangelove). Sometimes the AI is an automated version of a human, perhaps a human fighters faithful companion (the robot R2-D2 in Star Wars).

These science fiction tropes are legitimate models for military discussion and many are being discussed. But there are other possibilities. In particular, machine learning may give rise to new forms of intelligence; not natural, but not really artificial if the term implies having been designed in detail by a person. Such new forms of intelligence may resemble that of humans or other animals, and we will discuss them using language associated with humans, but we are not discussing robots that have been deliberately programmed to emulate human intelligence. Through machine learning they have been programmed by their own experiences. We speculate that some of the characteristics that humans have evolved over millennia will also evolve in future AI, characteristics that have evolved purely for their success in a wide range of situations that are real, for humans, or simulated, for robots.

As the capabilities of AI-enabled robots increase, and in particular as behaviors emerge that are both complex and outside past human experience, how will we organize, train, and command them and the humans who will supervise and maintain them? Existing methods and structures, such as military ranks and doctrine, that have evolved over millennia to manage the complexity of human behavior will likely be necessary. But because robots will evolve new behaviors we cannot yet imagine, they are unlikely to be sufficient. Instead, the military and its partners will need to learn new types of organization and new approaches to training. It is impossible to predict what these will be but very possible they will differ greatly from approaches that have worked in the past. Ongoing experimentation will be essential.

How to Respond to AI Advances

The development of AI, especially machine learning, will lead to unpredictable new types of robots. Advances in AI suggest that humans will have the ability to create many types of robots, of different shapes, sizes, or degrees of independence or autonomy. It is conceivable that humans may one day be able to design tiny AI bullets to pierce only designated targets, automated aircraft to fly as loyal wingmen alongside human pilots, or thousands of AI fish to swim up an enemys river. Or we could design AI not as a device but as a global grid that analyzes vast amounts of diverse data. Multiple programs funded by the Department of Defense are on their way to developing robots with varying degrees of autonomy.

In science fiction, robots are often depicted as behaving in groups (like the robot dogs in Metalhead). Researchers inspired by animal behaviors have developed AI concepts such as swarms, in which relatively simple rules for each robot can result in complex emergent phenomena on a larger scale. This is a legitimate and important area of investigation. Nevertheless, simply imitating the known behaviors of animals has its limits. After observing the genocidal nature of military operations among ants, biologists Bert Holldobler and E. O. Wilson wrote, If ants had nuclear weapons, they would probably end the world in a week. Nor would we want to limit AI to imitating human behavior. In any case, a major point of machine learning is the possibility of uncovering new behaviors or strategies. Some of these will be very different from all past experience; human, animal, and automated. We will likely encounter behaviors that, although not human, are so complex that some human language, such as personality, may seem appropriately descriptive. Robots with new, sophisticated patterns of behavior may require new forms of organization.

Military structure and scheme of maneuver is key to victory. Groups often fight best when they dont simply swarm but execute sophisticated maneuvers in hierarchical structures. Modern military tactics were honed over centuries of experimentation and testing. This was a lengthy, expensive, and bloody process.

The development of appropriate organizations and tactics for AI systems will also likely be expensive, although one can hope that through the use of simulation it will not be bloody. But it may happen quickly. The competitive international environment creates pressure to use machine learning to develop AI organizational structure and tactics, techniques, and procedures as fast as possible.

Despite our considerable experience organizing humans, when dealing with robots with new, unfamiliar, and likely rapidly-evolving personalities we confront something of a blank slate. But we must think beyond established paradigms, beyond the computer as all-powerful or the computer as loyal sidekick.

Humans fight in a hierarchy of groups, each soldier in a squad or each battalion in a brigade exercising a combination of obedience and autonomy. Decisions are constantly made at all levels of the organization. Deciding what decisions can be made at what levels is itself an important decision. In an effective organization, decision-makers at all levels have a good idea of how others will act, even when direct communication is not possible.

Imagine an operation in which several hundred underwater robots are swimming up a river to accomplish a mission. They are spotted and attacked. A decision must be made: Should they retreat? Who decides? Communications will likely be imperfect. Some mid-level commander, likely one of the robot swimmers, will decide based on limited information. The decision will likely be difficult and depend on the intelligence, experience, and judgment of the robot commander. It is essential that the swimmers know who or what is issuing legitimate orders. That is, there will have to be some structure, some hierarchy.

The optimal unit structure will be worked out through experience. Achieving as much experience as possible in peacetime is essential. That means training.

Training Robot Warriors

Robots with AI-enabled technologies will have to be exercised regularly, partly to test them and understand their capabilities and partly to provide them with the opportunity to learn from recreating combat. This doesnt mean that each individual hardware item has to be trained, but that the software has to develop by learning from its mistakes in virtual testbeds and, to the extent that they are feasible, realistic field tests. People learn best from the most realistic training possible. There is no reason to expect machines to be any different in that regard. Furthermore, as capabilities, threats, and missions evolve, robots will need to be continuously trained and tested to maintain effectiveness.

Training may seem a strange word for machine learning in a simulated operational environment. But then, conventional training is human learning in a controlled environment. Robots, like humans, will need to learn what to expect from their comrades. And as they train and learn highly complex patterns, it may make sense to think of such patterns as personalities and memories. At least, the patterns may appear that way to the humans interacting with them. The point of such anthropomorphic language is not that the machines have become human, but that their complexity is such that it is helpful to think in these terms.

One big difference between people and machines is that, in theory at least, the products of machine learning, the code for these memories or personalities, can be uploaded directly from one very experienced robot to any number of others. If all robots are given identical training and the same coded memories, we might end up with a uniformity among a units members that, in the aggregate, is less than optimal for the unit as a whole.

Diversity of perspective is accepted as a valuable aid to human teamwork. Groupthink is widely understood to be a threat. Its reasonable to assume that diversity will also be beneficial to teams of robots. It may be desirable to create a library of many different personalities or memories that could be assigned to different robots for particular missions. Different personalities could be deliberately created by using somewhat different sets of training testbeds to develop software for the same mission.

If AI can create autonomous robots with human-like characteristics, what is the ideal personality mix for each mission? Again, we are using the anthropomorphic term personality for the details of the robots behavior patterns. One could call it a robots programming if that did not suggest the existence of an intentional programmer. The robots personalities have evolved from the robots participation in a very large number of simulations. It is unlikely that any human will fully understand a given personality or be able to fully predict all aspects of a robots behavior.

In a simple case, there may be one optimum personality for all the robots of one type. In more complicated situations, where robots will interact with each other, having robots that respond differently to the same stimuli could make a unit more robust. These are things that military planners can hope to learn through testing and training. Of course, attributes of personality that may have evolved for one set of situations may be less than optimal, or positively dangerous, in another. We talk a lot about artificial intelligence. We dont discuss artificial mental illness. But there is no reason to rule it out.

Of course, humans will need to be trained to interact with the machines. Machine learning systems already often exhibit sophisticated behaviors that are difficult to describe. Its unclear how future AI-enabled robots will behave in combat. Humans, and other robots, will need experience to know what to expect and to deal with any unexpected behaviors that may emerge. Planners need experience to know which plans might work.

But the human-robot relationship might turn out to be something completely different. For all of human history, generals have had to learn their soldiers capabilities. They knew best exactly what their troops could do. They could judge the psychological state of their subordinates. They might even know when they were being lied to. But todays commanders do not know, yet, what their AI might prove capable of. In a sense, it is the AI troops that will have to train their commanders.

In traditional military services, the primary peacetime occupation of the combat unit is training. Every single servicemember has to be trained up to the standard necessary for wartime proficiency. This is a huge task. In a robot unit, planners, maintainers, and logisticians will have to be trained to train and maintain the machines but may spend little time working on their hardware except during deployment.

What would the units look like? What is the optimal unit rank structure? How does the human rank structure relate to the robot rank structure? There are a million questions as we enter uncharted territory. The way to find out is to put robot units out onto test ranges where they can operate continuously, test software, and improve machine learning. AI units working together can learn and teach each other and humans.

Conclusion

AI-enabled robots will need to be organized, trained, and maintained. While these systems will have human-like characteristics, they will likely develop distinct personalities. The military will need an extensive training program to inform new doctrines and concepts to manage this powerful, but unprecedented, capability.

Its unclear what structures will prove effective to manage AI robots. Only by continuous experimentation can people, including computer scientists and military operators, understand the developing world of multi-unit human and robot forces. We must hope that experiments lead to correct solutions. There is no guarantee that we will get it right. But there is every reason to believe that as technology enables the development of new and more complex patterns of robot behavior, new types of military organizations will emerge.

Thomas Hamilton is a Senior Physical Scientist at the nonprofit, nonpartisan RAND Corporation. He has a Ph.D. in physics from Columbia University and was a research astrophysicist at Harvard, Columbia, and Caltech before joining RAND. At RAND he has worked extensively on the employment of unmanned air vehicles and other technology issues for the Defense Department.

Image: Wikicommons (U.S. Air Force photo by Kevin L. Moses Sr.)

Read more here:
How to Train Your AI Soldier Robots (and the Humans Who Command Them) - War on the Rocks

AI Is Top Game-Changing Technology In Healthcare Industry – Forbes

Of the many ingredients that go into quality healthcare, comprehensive patient data is close to the top of the list. No one knows this more than Mayur Saxena, CEO and founder of Droice Labs. Saxena created his startup while he was pursuing his doctorate degree at Columbia University, and working at healthcare company conducting clinical trials on new medication. Hes energized by the plethora of opportunities to improve healthcare using artificial intelligence (AI) and machine learning.

Mayur Saxena, CEO and founder of Droice Labs, is energized by the plethora of opportunities to improve healthcare using artificial intelligence (AI) and machine learning.

Patient data is notoriously disorganized and complex, he said. With machine learning, healthcare professionals can organize that information to better understand the disease of every patient and reach them faster with interventions that improve their lives. Its an amazing feeling when you talk with someone whos recovered from an illness because they received the right care.

The idea behind Droice is to make messy data neat, so people can spend less time organizing it and more time analyzing it.

Insights drive personalized patient care

The startup has collected data from 50 million patients in working with healthcare providers, payors, and government organizations in the U.S. and Europe. Healthcare professionals in hospitals, pharmaceutical firms, medical device manufacturing, and insurance rely on Droice Labs natural language understanding (NLU) technology. NLU make sense of patient information in multiple languages from anywhere such as electronic medical records (EMR), insurance claims, research reports, and medical devices.

Our machine learning system takes all the data about an individual into account, and breaks it down so that a doctor, pharmaceutical scientist or healthcare insurer can understand patients better and faster, said Saxena. Instead of repetitive, disparate one-on-one diagnoses and follow-up care, were automating personalized care for a much larger patient population. With shared insights across a large patient population, physicians can chart disease progress and prescribe the best treatment plan. Clinical research into new drugs that took years could be reduced to days or weeks.

Saxena said that one hospital reduced the amount of time it took to arrive at an appropriate diagnosis for patients by over 20 percent.

SAP.iO Foundry opens up world of healthcare opportunities

Droice Labs recently participated in the latest healthcare-focused accelerator program at SAP.iO Foundry New York. It was one of seven up and coming startups working with hospital system providers, employee health and wellness solutions, medical devices, and health IT.

Weve learned so much about customers in the healthcare industry from SAPs sales and product teams, said Saxena. These large organizations have unique needs, and were grateful for the opportunity to partner with SAP, a company with a massive presence across so many geographies. Weve gained valuable insights about strategic global selling and scaling our technology to meet the unique requirements of these customers.

The Droice Labs machine learning platform is now downloadable on the SAP App Center.

Turning long-time passion into thriving startup

Droice Labs reflects Saxenas long-time personal and career commitment to healthcare. After earning his undergraduate degree in bioengineering and biomedical engineering, he worked in high-performance computing in Singapore before arriving in the United States. Thats when he acted on his passion, exploring how AI and machine learning can help improve patient care, and potentially eradicate disease.

Were looking at data from hundreds of thousands of patients a day, helping improve their care pathways across the healthcare system, said Saxena. We have the technology to work with patient data at scale. Im most excited about working together with recognized healthcare experts using state-of-the-art technology to address major challenges in this complicated, regulated industry.

Digitally trustworthy strategy

In an environment where patient concerns and regulations around data control continue to increase, Saxena emphasized his companys strategy of digital trust.

Everything we do is designed to respect individual patient privacy, he said. We dont possess related identifying data on patients, and we remove any identifiers. Working in a mission critical environment like healthcare brings a set of responsibilities. If there is a population suffering from disease, and by looking at their information we can partner with healthcare providers to help make their quality of life better, thats what well do. But we dont participate in business models targeted to specific individuals.

Saxena expected his companys rapid growth trajectory to continue, and it was easy to see why. According to Gartners 2020 CIO Survey, AI is the healthcare industrys top game-changing technology. These analysts predicted 75 percent ofhealthcare delivery organizationswill invest in an AI capability to explicitly improve either operational performance or clinical outcomes by 2021.

Read this article:
AI Is Top Game-Changing Technology In Healthcare Industry - Forbes

Intertrust Shows Off New White-Box Cryptography Solution for Web Apps – AiThority

Secure Key Box (SKB) for Web is Intertrusts new enterprise-ready white-box cryptography solution for web applications. It brings the security vendors widely used whiteCryption technology, which prevents attackers from extracting keys using static or dynamic methods, to web and mobile apps. The company is showing off the new product at this years big RSA Conference.

Intertrusts Bill Horne said in a press statement that SKB for Web makes it extremely difficult for an attacker to reverse engineer apps or extract key information even when the Javascript source code of the implementation is available.

Recommended AI News: Domo Wins DEVIES Award For Best Innovation In IoT

The solution prevents attacks because it allows standard cryptographic functions to be performed without the keys ever being exposed whether in use or at rest. SKB for Web also protects keys and credentials from side-channel attacks by making them safe from exploits running within the browser, as well as natively on the PC or device.

According to Horne, the problem is that a lot of people think by using cryptography, they are protecting their applications from rogue actors but theyre merely shifting the problem from the data to the keys themselves.

Secure Key Box for Web prevents hackers from stealing keys from web applications, resisting existing and future side-channel and fault injection attacks with drop-in and go ease that requires no additional operations or protocols.

Recommended AI News: Rockset Gains Momentum as the Industrys Leading Real-Time Database in the Cloud

APIs are being used more and more to interact with apps on the server-side, but browser APIs and third-party cryptographic libraries cannot protect keys from attacks on the underlying host without having access to its hardware security support. Hackers are able to obtain keys through various rogue techniques.

SKB for Web is delivered as a JavaScript consumable API that does all the common cryptographic functions. It protects cryptographic keys even when running on a compromised host. The solution provides stronger and broader protection than low-level interfaces, such as the Web Crypto API, which do not secure against attacks running outside the browser.

Recommended AI News: Successful Digital Transformation Requires New Breed of CFO, Sage Study Shows

The rest is here:
Intertrust Shows Off New White-Box Cryptography Solution for Web Apps - AiThority

Implementation of blockchain in insurance too slow, says Kennedys head of R&D – Insurance Business Australia

What is blockchain? Insurance Business sat down with Karim Derrick, head of research and development at Kennedys, to talk about the new cryptography-based piece of technology and learn why, on the whole, larger firms within the insurance space have been hesitant to embrace it.

Kennedys is one of the primary event partners at Insurance Businesss TechFest in May, that will further explore blockchain in the insurtech sphere.

My personal view is that, no, blockchain is not very well understood, Derrick said to Insurance Business. The fact of the matter is that insurance has been, although it is catching up, quite a long way behind the curve on this.

Derrick describes the legacy systems, in terms of technology, that are embedded within large insurers that mean blockchain technology has yet to be embraced as quickly as in other sectors. Similar to legacy airlines, the larger, older companies, for various reasons, have been slower than their smaller, newer counterparts to embrace technology such as blockchain, and wield themselves off well-established but outdated forms of in-house technology.

Derrick explained that large insurers often use technology and database systems that originate from some generations back, and that there remains a lack of general understanding of those databases themselves let alone blockchain.

I dont think that databases are properly understood in the industry, he said. And at the end of the day, blockchain is just a special kind of database.

Read more: Aons latest study examines the "true potential" of blockchain for insurers

Blockchain is described by Blockgeeks as a time-stamped series of immutable records of data that is managed by a cluster of computers not owned by any single entity and each of these blocks of data is secured and bound to each other using cryptographic principles. Effectively it is a new form of database for what is becoming an increasingly new, technology-driven world of work.

Derrick explained to Insurance Business that one explanation for the apparent reluctance to understand and utilise blockchain is to do with its association with bitcoin.

For whatever reason, bitcoin has dominated the headlines and blockchain was the cryptocurrency enabler, Derrick explained. The two have been tied together and there is a circus around it and all the bluster it has created.

But leading insurers would do well, and there have been previous efforts along these lines, to understand the benefits blockchain can bring, and then fully utilise those benefits.

If you think about it, insurance itself has some problems that blockchain can really address, explained Derrick. Fraud is the obvious one because criminals often exploit existing gaps in databases. Blockchain could provide a solution to that with firms being able to manage their own databases without exposing books to anyone, but at the same time still benefiting from the common data system.

Claims going into the blockchain can be maintained by individual insurers and used without necessarily exposing all their claims to other insurers, he said. However, you can still take a new claim from a new claimant and look to see that individuals claim history, etc.

Blockchain provides ample opportunities for insurers to complement and improve their existing operations, and while the technology is straightforward, implementing it has not been.

The technology is simple it really is, Derrick said. Implementing it in areas which have obvious need for it but are well established was always going to be difficult.

Join us to learn more at our TechFest in May at The Fullerton Hotel in Sydney. Registration is still open.

Read more:
Implementation of blockchain in insurance too slow, says Kennedys head of R&D - Insurance Business Australia

Quantum Cryptography Market on the basis of Usability, Technology, Procedure, Application, and Region by (2020-2026) – New Day Live

Global Quantum Cryptography Market 2020 Report comprises of strong research of global business which empowers the consumer to look at the possible requirement as well as foresee the implementation. The restraints and drivers have been assembled following a deep study of the global Quantum Cryptography Market proficiency. The development ratio thats requested from the viewpoint of the rational analysis offers detailed info of the global Quantum Cryptography industry. Quantum Cryptography Market Research report has analyzed all current trends and previous status of business under the supervision of business specialists. By which report supplies impending assessment of Quantum Cryptography Market that includes market size in value and volume by region, manufacturers, kind and application.

Get Sample Report @ https://www.reportsintellect.com/sample-request/866675

Top Companies in the Quantum Cryptography Market Report:QuantiqueMagiq TechnologiesQuintessencelabsNucryptQutoolsQaskyCrypta LabsQubitekkPQ SolutionsInfineonResearch CompaniesMitsubishiIBMHPNEC CorporationToshiba

Description:

In this report were presenting our clients with the most in detailed records of the Quantum Cryptography Market and as the global markets are converting very rapidly especially in the last few years the markets are becoming tougher to get a hold of and subsequently our analysts have organized a detailed review while considering the history of the marketplace and a very specific forecast in accordance with the past.

The given document specializes in prominent manufacturers of Quantum Cryptography marketplace and discusses aspects such as organization profiles, production, fee, cost, sales, product photograph and specification, potential, and other essentials to make it big in the market. Upstream raw materials, device, and additives, and downstream demand evaluation are also discussed. The Global Quantum Cryptography market growth developments and advertising and marketing channels are also taken into consideration.

Quantum Cryptography Market Segmentation by Types:

HardwareService

Quantum Cryptography Market Segmentation by Applications:

Database EncryptionNetwork Layer EncryptionApplication SecurityOthers

Get Discounted Report @ https://www.reportsintellect.com/discount-request/866675

Table of Content:

1 Market Overview2 Companys Profiles3 Sales, Revenue and Market Share by companies4 Global Market Analysis by Regions5 North America by Country6 Europe by Country7 Asia-Pacific by Regions8 South America by Country9 Middle East & Africa by Countries10 Market Segment by Type11 Global Quantum Cryptography Market Segment by Application12 Market Forecast13 Sales Channel, Distributors, Traders and Dealers14 Research Findings and Conclusion15 Appendix

The file can help to understand the marketplace and strategize for commercial enterprise growth for this reason. In the approach analysis, it gives insights from advertising channel and marketplace positioning to capacity boom strategies, presenting in-intensity evaluation for new entrants or exists competitors within the Quantum Cryptography industry.

Reasonsto Buythis Quantum Cryptography Report:

About us:Reports Intellect is your one-stop solution for everythingassociated withmarketing researchand market insight. We understand the importance of market intelligence & its need in todays competitive world.

Our professional team works hard to fetchthe foremostauthentic research reports backed with spotless data figures which guarantee outstanding resultswheneverfor you.

So, whetheritsthe newestreport from the researchers or a custom requirement, our team is hereto assistyouwithin theabsolute bestway.

Contact Us:Sales@reportsintellect.comPH + 1-706-996-2486US Address:225 Peachtree Street NE,Suite 400,Atlanta, GA 30303

View post:
Quantum Cryptography Market on the basis of Usability, Technology, Procedure, Application, and Region by (2020-2026) - New Day Live

Quantum internet: the next global network is already being laid – The Conversation UK

Google reported a remarkable breakthrough towards the end of 2019. The company claimed to have achieved something called quantum supremacy, using a new type of quantum computer to perform a benchmark test in 200 seconds. This was in stark contrast to the 10,000 years that would supposedly have been needed by a state-of-the-art conventional supercomputer to complete the same test.

Despite IBMs claim that its supercomputer, with a little optimisation, could solve the task in a matter of days, Googles announcement made it clear that we are entering a new era of incredible computational power.

Yet with much less fanfare, there has also been rapid progress in the development of quantum communication networks, and a master network to unite them all called the quantum internet. Just as the internet as we know it followed the development of computers, we can expect the quantum computer to be accompanied by the safer, better synchronised quantum internet.

Like quantum computing, quantum communication records information in what are known as qubits, similar to the way digital systems use bits and bytes. Whereas a bit can only take the value of zero or one, a qubit can also use the principles of quantum physics to take the value of zero and one at the same time. This is what allows quantum computers to perform certain computations very quickly. Instead of solving several variants of a problem one by one, the quantum computer can handle them all at the same time.

These qubits are central to the quantum internet because of a property called entanglement. If two entangled qubits are geographically separated (for instance, one qubit in Dublin and the other in New York), measurements of both would yield the same result. This would enable the ultimate in secret communications, a shared knowledge between two parties that cannot be discovered by a third. The resulting ability to code and decode messages would be one of the most powerful features of the quantum internet.

There will be no shortage of commercial applications for these advanced cryptographic mechanisms. The world of finance, in particular, looks set to benefit as the quantum internet will lead to enhanced privacy for online transactions and stronger proof of the funds used in the transaction.

Recently, at the CONNECT Centre in Trinity College Dublin, we successfully implemented an algorithm that could achieve this level of security. That this took place during a hackathon a sort of competition for computer programmers shows that even enthusiasts without detailed knowledge of quantum physics can create some of the building blocks that will be needed for the quantum internet. This technology wont be confined to specialist university departments, just as the original internet soon outgrew its origins as a way to connect academics around the world.

But how could this quantum internet be built anytime soon when we currently can only build very limited quantum computers? Well, the devices in the quantum internet dont have to be completely quantum in nature, and the network wont require massive quantum machines to handle the communication protocols.

One qubit here and there is all a quantum communication network needs to function. Instead of replacing the current infrastructure of optical fibres, data centres and base stations, the quantum internet will build on top of and make maximum use of the existing, classical internet.

With such rapid progress being made, quantum internet technology is set to shape the business plans of telecom companies in the near future. Financial institutions are already using quantum communication networks to make inter-bank transactions safer. And quantum communication satellites are up and running as the first step to extending these networks to a global scale.

The pipes of the quantum internet are effectively being laid as you read this. When a big quantum computer is finally built, it can be plugged into this network and accessed on the cloud, with all the privacy guarantees of quantum cryptography.

What will the ordinary user notice when the enhanced cryptography of the quantum internet becomes available? Very little, in all likelihood. Cryptography is like waste management: if everything works well, the customer doesnt even notice.

In the constant race of the codemakers and codebreakers, the quantum internet wont just prevent the codebreakers taking the lead. It will move the race track into another world altogether, with a significant head start for the codemakers. With data becoming the currency of our times, the quantum internet will provide stronger security for a new valuable commodity.

Continued here:
Quantum internet: the next global network is already being laid - The Conversation UK

The Top 7 Network Security Books You Need to Read in 2020 – Solutions Review

For network engineers and administrators thatfocus on network security, books are an excellent resource for learning how to effectively design and operate network security solutions. To that end, weve listed the top seven network security books that you should add to your reading list below. These books are intended for beginners and experts alike and are written by authors with proficiency and/or recognition in building and running wireless networks.

If youre looking for resources to help you evaluate network performance monitoring (NPM) solutions, our freeNetwork Monitoring Buyers Guidehas you covered! It contains profiles on the top network monitoring providers in the market today, including descriptions of the tools they offer and noteworthy features of each. The guide also features 10 questions you should ask prospective vendors and yourself before buying a network monitoring solution. You can check out that guidehere.

by Chris Sanders and Jason Smith

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach, complete with real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network.

by William Stallings

StallingsCryptography and Network Security, Seventh Edition,introduces the reader to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. The purpose of this book is to provide a practical survey of both the principles and practice of cryptography and network security.

by Amanda Berlin and Lee Brotherston

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations dont have the budget to establish or outsource an information security program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.

by Ed Wilson

Ever wonder whats actually happening inside your network? Why multi-tier applications suddenly slow down, print jobs fail, network elements suddenly disappear? [] Thats where Ed Wilsons Network Monitoring and Analysis comes in. Its your complete, hands-on guide to monitoring and analyzing Windows NT-based networks-and using the information to maximize performance, plan for growth-even identify intruders!

by William Stallings

Network Securities Essentials: Applications and Standards introduces readers to the critical importance of internet security in our age of universal electronic connectivity. Amidst viruses, hackers, and electronic fraud, organizations and individuals are constantly at risk of having their private information compromised. This creates a heightened need to protect data and resources from disclosure, guarantee their authenticity, and safeguard systems from network-based attacks.

by Robert Collins

The author begins by explaining some of the basics of computer networking and the basic tools which can be used for monitoring a computer network. The process of capturing and analyzing the packets of a network is discussed in detail. This is a good technique which can help network security experts identify anomalies or malicious attacks on the packets transmitted over a network. You are also guided on how to monitor the network traffic for the Heartbleed bug, which is very vulnerable to network attackers.

by Manuj Aggarwal

While connected to the internet, youre a potential target for an array of cyber threats, such as hackers, keyloggers, and Trojans that attack through unpatched security holes. A firewall works as a barrier (or shield) between your computer and cyberspace. pfSense is highly versatile firewall software. With thousands of enterprises using pfSense, it is fast becoming the worlds most trusted open source network security solution.

Looking for a solution to help you improve your network performance? OurNetwork Monitoring Buyers Guidecontains profiles on the top network performance monitor vendors, as well as questions you should ask providers and yourself before buying.

Check us out onTwitterfor the latest in Network Monitoring news and developments!

Dan is a tech writer who writes about Enterprise Cloud Strategy and Network Monitoring for Solutions Review. He graduated from Fitchburg State University with a Bachelor's in Professional Writing. You can reach him at dhein@solutionsreview.com

Original post:
The Top 7 Network Security Books You Need to Read in 2020 - Solutions Review

Robots, clocks and computers: How Ancient Greeks got there first – WHBL News

Tuesday, February 18, 2020 8:07 a.m. CST by Thomson Reuters

By George Georgiopoulos and Deborah Kyvrikosaios

ATHENS (Reuters) - A humanoid figure dressed as a maid holds a jug in its right hand and, as hidden gears click and whirr, lifts it and pours wine into a cup a bystander has placed into the palm of its left.

The robot is a recreation of the automatic servant of Philon, designed more than 2,200 years ago by a Greek engineer and operating though a complex mechanism of springs, weights and air pressure that also allowed it to dilute the alcohol with water.

It is the focal point of an exhibition of more than 100 inventions that highlight the vast extent of Ancient Greece's technological legacy and also features an analogue computer, an alarm clock and automatic fire doors.

"By just opening up the hood of a modern car, you will see bolts and nuts, screws, automatic pilots. All of these were just some of the inventions (pioneered)... by the ancient Greeks that were the building blocks of complex technology," said exhibition director Panagiotis Kotsanas.

The exhibits are explained with audio-visual material and detailed diagrams, and many are interactive.

The automatic doors of Heron of Alexandria were considered a miracle of the gods. Installed in a temple, they opened when a fire burned on its altar, to the awe of those spectating.

Viewed as a precursor of the computer, the 2,000-year-old Antikythera mechanism forecast astronomical and calendar events using gears and dials.

The philosopher Plato's alarm clock used a hydraulic system of ceramic jugs filled with water to 'ring' with a chirping sound at the desired time.

Other recreations include Polybolos, a repeating catapult capable of launching arrows in succession, examples of cryptography to send coded messages in times of war, and the Pyoulkos, a syringe used for injections and to remove pus.

The exhibition is on permanent display at the Kotsanas Museum of Ancient Greek Technology in central Athens.

(Reporting by George Georgiopoulos; writing and editing by John Stonestreet)

Follow this link:
Robots, clocks and computers: How Ancient Greeks got there first - WHBL News

What is Encryption & How Does it Work? | Security | Techworld

What is Encryption & How Does it Work? | Security | TechworldEncryption is just one way you can prevent data theft. Techworld explains what encryption is and how it works

Share

The need for encryption and tough security measures is at an all-time high, with an increasing number of businesses and consumers falling victim to a whole host of cyber crimes.

Although, the method of encrypting information is certainly not new. In fact, cryptography dates back to ancient times, the only real difference being that now we use electronic devices to generate unique encryption algorithms to scramble our data.

These days you'll find encryption in most things that run using an internet connection, from messaging apps and personal banking apps to websites and online payment methods.

And for consumers, making sure your data cannot be stolen or used for ransom has never been more important.

But encryption is not without bad press. Pretty Good Encryption (PGP), a popular email encryption program has hit the headlines this week afterGerman researchers found a major vulnerability which could reveal past and present encrypted emails.

Find out more about PGP's encryption vulnerability here.

Techworld looks to explain what encryptionis and how it works.

In its most basic form, encryption is the process of encoding data, making it unintelligible and scrambled. In a lot of cases, encrypted data is also paired with an encryption key, and only those that possess the key will be able to open it.

An encryption key is a collection of algorithms designed to be totally unique. These are able to scramble and unscramble data, essentially unlocking the information and turning it back to readable data.

Usually, the person that is encrypting the data will possess the key that locks the data and will make 'copies' and pass them on to relevant people that require access. This process is calledpublic-key cryptography.

Computer or at least machine cryptography, which encryption is a form of,became significant during the second world war with military forces across Europe tasked with breaking Germany's Enigma code.

Read next:Best anti-ransomware tools 2018

Convoys travelling across the Atlantic were a vital lifeline forBritain as the majority of Europe was occupied by the Nazis.

German U-Boats often used radio signals to send encrypted messages to one another and attack these convoys en masse, planning and undertaking coordinated attacks. It was these messages that werecreated by the German Navy's Enigma machines, which the British forces set out to decrypt.

And while it's believed that Polish mathematicianMarian Rejewski actually cracked the Enigma code in 1938, not the British, at Bletchley Park in England, Alan Turing and Gordon Weichman created a code-breaking machine calledColossus based on Rejewski's which became the first programmable digital computer.

This marked a huge turning point for encryption and decryption.

In practice, when you send a message using an encrypted messaging service (WhatsApp for example), the service wraps the message in code, scrambling it and creating an encryptionkey. It can then only be unlocked by the recipient of the message.

Digital encryption is extremely complicated and that's why it is considered difficultto crack. To bolster that protection, a new set of encryption algorithms is created each time two smartphones begin communicating with one another.

You might have heard of end-to-end encryption, perhaps you've received a notification on WhatsApp saying that they now support this type of encryption.

End-to-end encryptionrefers to the process ofencoding and scrambling some information so only the sender and receiver can see it.

As previously explained, encryption keys can work as a pair, one locking the information and multiple (which can be passed out) to unlock the encrypted information.

With end-to-end encryption, however, only the sender and recipient are able to unlock and read the information. With WhatsApp, the messages are passed through a server, but it is not able to read the messages.

The diagram above shows how end-to-end encryption works, with one person sending a message to another.

There are two main methods of encryption that can be done: symmetric and asymmetric. Although, it is worth noting that within these two ways, there are various of encryptionalgorithms that are used to keep messages private.

So, while we've touched on symmetric and asymmetricencryption briefly already, you can gather more detail here.

Symmetric encryption is the process of using the same key (two keys which are identical) for both encrypting and decrypting data.

This will mean two or more parties will have access to the same key, which for some is a big drawback, even though the mathematical algorithm to protect the data is pretty much impossible to crack. People's concerns often land with the behaviours of those with access to the shared key.

Conversely,asymmetric encryption refers to the method of using a pair of keys: one for encrypting the data and the other for decrypting it.

This process is depicted in the above diagram. The first key is called the public key and the second is called the private key. The public key is shared with the servers so the message can be sent, while the private key, which is owned by the possessor of the public key, is kept a secret, totally private.

Only the person with the private key matching the public one will be able to access the data and decrypt it, making it impenetrable to intruders.

There are numerous common encryption algorithms and methods designed to keep information private. You may already be aware of some of them including RSA, Triple DES and Blowfish.

Data Masking is a form of encryption that creates a similar, yet inaccurate version of an organisations data. This data can be interpreted by the organisation, so is functional and can be used in place of the real data.

"Encryption is an essential part of an organisations security portfolio, securing data whilst it is in transit or not being used," saysJes Breslaw, director of strategy at Delphix. "However, it does not solve one of the biggest challenges when protecting sensitive data: when it is being consumed by business applications.

"Data masking is the complementary solution to encryption that solves this problem by replacing sensitive information with fictitious, yet realistic data. What makes masking attractive is that it keeps data safe and of good quality; yet, unlike encrypted data, masked data cant be reversed its one way."

The upcoming deadline for GDPR means that this form of technology is growing in use, as it not only hides direct consumer data, but also indirect data linking to an individual.

"In order to mask data, some companies create their own masking scripts, or turn to legacy vendors with bloated interfaces that require high levels of expertise," explains Breslaw.

"The reason they fail is that translating large amounts of data is a slow and costly exercise delaying projects and forcing departments to use poor quality data. Worse still, many dont protect data at all, something that GDPR will not forgive. Dynamic Data Platforms combine data masking with modern approaches to virtualising and automating the delivery and securing of data."

Share

Go here to read the rest:
What is Encryption & How Does it Work? | Security | Techworld

Why the US government is questioning WhatsApp’s encryption – CNBC

On December 2nd, 2015, Syed Rizwan Farook and Tashfeen Malik opened fire on the city of San Bernardino, California, leaving 14 people, and the two shooters, dead. During the investigation the FBI obtained Farook's iPhone, but could not access it through the passcode. They went Apple to unlock it, and Apple couldn't help.

The iPhone's encryption methods were so secure, according to Apple, that Apple itself couldn't access the data on the phone. As a result, the U.S. government wanted Apple to purposefully weaken the encryption of its iPhones, putting a "backdoor" in the iOS framework that would allow the FBI to access the contents of iPhones everywhere. But this would also leave the operating system much more vulnerable to hackers and other governments.

The battle over online privacy has been waging on since the popularization of the internet itself. These discussions with Apple in particular have brought privacy activists and law enforcement head to head, fighting over who can utilize the privacy provided by encryption and what they can use that encryption for.

Messaging apps like Signal, WhatsApp and iMessage are encrypted. That means the messages are kept private from everyone except the intended recipient. And while these platforms are far from perfect Jeff Bezos' phone was recently accessed through a malicious video message via WhatsApp many people rely on the privacy encryption provides daily.

Esra'a Al Shafei, for example, built a social platform called Ahwaa where individuals who identify as LGBTQ+ can virtually meet and talk with each other in Middle Eastern and North African countries such as Egypt, where homosexuality is not expressly illegal, but where the government has used laws against what they call debauchery, among others, to criminalize LGBTQ+ individuals.

Ahwaa is an online platform for individuals in the Middle East and North Africa who identify as LGBTQ+

Ahwaa.org

Al Shafei says that, if encryption were to be forcibly weakened, she would have to shut down the platform. She said, "the Internet as a whole will lose so many voices, so many communities, so many narratives, so many perspectives."

Michael Daniel, President and CEO of Cyber Threat Alliance and former Cybersecurity Coordinator on the National Security Council Staff under Barack Obama, says that "there are situations where we would want the government to be able to get access to certain information." For Michael, it's important to make a distinction between information that should remain encrypted, like bank data and health data, and information that might be beneficial to make available to law enforcement, like text message.

The Electronic Frontier Foundation disagrees. "I don't think it's appropriate for the government to decide that they get security and we don't," says Cindy Cohn, Executive Director of the Electronic Frontier Foundation. Amnesty International agreed with this sentiment in an open letter to Facebook, urging the company to stay strong on its decision to implement end-to-end encryption on its messaging platforms, saying "there is no middle ground: if law enforcement is allowed to circumvent encryption, then anybody can."

The debate continues, and is likely to continue, until a compromise can be made. Whether that will ever happen has yet to be seen.

Original post:
Why the US government is questioning WhatsApp's encryption - CNBC