Veterans, heroism and whistleblowing – Boca Beacon

BY MARY BESS

We need to understand the spark of divinity within human beings who put their lives at risk to benefit others. Of particular interest are those who commit acts of heroism for which they will not be honored and may even be vilified, despised and ostracized.

Especially on Veterans Day, helicopter reconnaissance pilot Hugh Thompson, Jr. and his crew come to mind. Their chopper was hovering over My Lai on March 16, 1968 when they saw what looked like a massacre taking place. Civilians old men, women, even children, were being herded into a ditch and shot. Thompson brought down the chopper and warned U. S. soldiers that if they didnt stop shooting civilians, he would turn his guns on them. Strangely, there wasnt much screaming coming from the victims. Later it was learned that their tongues had been cut out to prevent screams.Pregnant women had been bayonetted through the belly. The lucky ones, according to Thompson, were those who took a round right through the brain. There was a lot of evil. This is not to say that the perpetrators of these war crimes werent victims themselves. A full account of the massacre can be found in The Forgotten Hero of My Lai: The Hugh Thompson Story, by Trent Angers.

Thompson reported the incident in a tearful rage when he returned to headquarters. When charges were brought against 26 officers and enlisted soldiers, including William Calley and Ernest Medina, he testified against them. They were acquitted or pardoned.

Thompson was shunned and condemned by the military, the government and the public for his whistleblowing. Congressman Mendel Rivers (D-S.C.) actually said Thompson was the only person at My Lai who should be punished and unsuccessfully tried to have him court- marshaled for turning his guns on fellow soldiers. People made death threats and left mutilated animals on his porch. Subsequent to My Lai he suffered post traumatic stress, bouts of alcoholism and severe nightmare disorder. He was married and divorced several times. Although the military abandoned him for telling the truth, he did not abandon the military, serving until 1983. He died in 2006 at age 62 with his surviving crew member Lawrence Colburn at his side.

Anyone who thinks whistleblowing is an easy road is mistaken. Thompson told the Associated Press in 2004, Dont do the right thing looking for a reward, because it might not come. Chelsea Manning, who was obligated by law under the Geneva Convention to report the murder of civilians gunned down by a U. S. Apache helicopter crew as they attempted to remove the dead and injured from an Iraqi street, was imprisoned in August 2013 for reporting the war crime as he was required to do. By doing so, according to the military, he was disrupting good order and discipline and discrediting the armed forces. Prosecutors did not present any evidence that the leaks caused harm to anyone. She served more than seven years of a 35-year sentence.

In 1998, 30 years after the My Lai massacre, Thompson and his crew were awarded the Soldiers Medal, the highest award for bravery not involving contact with the enemy. In 1999 Thompson and Colburn received the Peace Abbey Courage of Conscience Award.

Why did Thompson continue to speak out instead of going along with the subsequent coverup? At least two factors would seem to have influenced his behavior. His grandmother was a full-blooded Cherokee, whose ancestors were victims of ethnic cleansing under the Indian Removal Act. He was raised an Episcopalian in a working class family that condemned ethnic discrimination and aided minorities within the community.

My Lai became a symbol for everything wrong with our presence in Vietnam when Army veteran Ron Ridenhour and Dispatch News Service reporter Seymour Hersh broke the story. Because My Lai is the only massacre from the Vietnam era to gain wide notice, it is thought to be an anomaly. It wasnt.Hersh reports that, on a recent trip to Vietnam, he learned that massacres of civilians like the one that took place at My Lai were not unusual.

A study by the International Committee of the Red Cross reports that there have been 10 civilian deaths for every soldier death in wars fought since the mid-20th century. Practically speaking, civilians have become the enemy. Hugh Thompson reached out to enemy civilians in recognition that we are all one.

Mary Bess is a Boca Grande resident.

Marcy Shortuse is the editor of the Boca Beacon, and has been with the paper since 2007. She is also editor of the Boca Beacon's sister publication, Gasparilla Magazine.She has more than 20 years of experience writing and editing local newspapers and is originally from the Chicago area.

See original here:
Veterans, heroism and whistleblowing - Boca Beacon

New Ai Weiwei Documentary Champions the Artist as a Global Activist – – ARTnews

Ai Weieis 2014 exhibition on Alcatraz is readied, in a scene from Ai Weiwei: Yours Truly.

COURTESY FOR-SITE FOUNDATION

Ai Weiwei: Yours Truly, a new documentary by San Francisco gallerist Cheryl Haines, is a moving cinematic experience and so wide-ranging a project that it is likely to appeal even to those who might not think they are interested in the famed artist. Sadly, it is having only a one-day stand in New York this weekend as part of the DOC NYC festival. If you can make it to IFC in Greenwich Village at 12:15 p.m. on Sunday, be there. Otherwise, hope for a wider theatrical release soon.

Ai Weiwei: Yours Truly began as a feature about @Large: Ai Weiwei at Alcatraz, the public art project that Haines and the artist collaborated on in 2014, while Ai was still under house arrest in Beijing after his three-month imprisonment in 2011. Unable to travel from China and visit the site, he nonetheless designed an exhibition perfectly suited to the long-closed federal penitentiary-turned-national park. It amounted to a tribute to political prisoners around the world.

With the help of teams of assistants, over 100 larger-than-life pixelated portraits of jailed individuals were created out of millions of Lego blocks. Over 900,000 people visited the site during its seven-month run, certainly a large-enough crowd to mark the project as a major success and justify a documentary to capture it.

Ai Weiwei: Yours Truly.

COURTESY FOR-SITE FOUNDATION

Known the world over for his stance against the Chinese government, which more recently has expanded into a broad-based campaign for human rights, Ai is also a master of self-promotion, and is particularly adept at training the spotlight on his favorite causes. A documentary on so lionized a figure could have become a vanity project, given that the subject himself was involved in its creation. However, Haines, a first-time director, has managed to situate him in a larger context, rescuing the film from charges of narcissism.

Haines (who also could have turned this into her own opportunity for self-promotion, given her role as organizer and executive director of the For Site Foundation, the chief sponsor of the Alcatraz show) ultimately made Ai Weiwei: Yours Truly into an examination of the recent history of political repression.

Early on, she incorporates astounding footage of China in the 1950s, when Ais father, the venerated poet Ai Qing, was a victim of the Anti-Rightist Campaign and was sent to a work camp in Xinjiang Province. With testimony from the artists mother Gao Ying and his brother Ai Dan and a scattering of remaining family photographs, the film conveys the insurmountable hardships and degradation they faced in exile. At another point, the film examines the history of Alcatraz as a site of oppression and protest, ranging from the detainment of Hopi leaders in 1895 to the occupation of the island by Native American activists in 1969.

Ais Alcatraz project tied together all these threads in a postcard component that encouraged visitors to send messages to imprisoned activists of their choosingthus the films name, Yours Truly. Ai was inspired to create this interactive artwork by the memory of his father receiving an anonymous postcard praising one of his poems while still in exile. Though just a child at the time, Ai recalls the momentary look of happiness on his fathers face.

The artists postcards, with innocuous pictures of birds and flowers from certain activists home countries, also made a profound impact on their receivers.

Ai Weiwei: Yours Truly director Cheryl Haines and the artist.

COURTESY FOR-SITE FOUNDATION

Haines and Ai heard back from hundreds of family members and from those who were able to reply from their jail cells. Recipients ranged from the Egyptian Arab Spring activist Ahmed Maher to former U.S. intelligence officer John Kiriakou, who disclosed the Bush Administrations use of waterboarding program and served prison time for releasing other classified information. According to the film, these postcards gave them hope at some of their bleakest moments of imprisonment.

One of the finest moments in the film is a scene where Ai, now free to travel and living in Berlin, visits government whistleblower Chelsea Manning after her release from prison. He had sent her a postcard saying, Keep strong and hold on to your idea. Whatever you think of Mannings disclosure of classified information to WikiLeaks, it is powerful to see the once-embattled pair meeting as free equals.

At an early point in the film, Ai explains himself by saying, It is your duty as an artist to fight for freedom of speech. That is the soul of any creativity. The documentary demonstrates that there is a worldwide network of people who feel the same way, and who have taken great risks to make their voices heard.

As the credits roll, names of imprisoned dissidents are listed, broken down by individual countries. China has the longest list by far, underscoring how brave Ai once was to speak out when he was living there, and how lucky he was that his detention ended after 81 days. This side of the artist is sometimes lost when audiences visit his less politically engaged exhibitions, and even when critics review his work. Ai Weiwei: Yours Truly makes the case that such engagement is always at the forefront of his thinking, not only when he finds himself in front of a camera.

Read more from the original source:
New Ai Weiwei Documentary Champions the Artist as a Global Activist - - ARTnews

First Darktable 3.0 Release Candidate is Live with New Features and Major UI Improvements – PetaPixel

The first release candidate for Darktable 3.0the popular free, open source Lightroom alternativewas announced earlier today, and it comes with some major improvements over 2.6, including UI improvements, a major rewrite of the Lighttable module, bug fixes, and more.

The release of Darktable 3.0.0rc0 comes (perhaps on purpose?) just as Adobe revealed its latest build of Lightroom at Adobe MAX, and it adds a bunch of features and enhancements that should make Darktable easier to use, navigate, and personalize.

Major improvements include (but are hardly limited to):

That last point addresses one of the complaints weve seen most regularly when writing about Darktable, so it has the potential to really improve the Darktable experience.

Theres way too much in this first release candidate to cover here, but suffice to say that the first build of Darktable 3.0 comes with a slew of new features, usability & UI improvements, and bug fixes, and you can read about all of them in detail at this link.

To learn more about this editor or pick up the first Release Candidate, head over to the Darktable website or go straight to GitHub to download Version 3.0.0rc0 for Windows, MacOS or Linux. And if youve never heard of Darktable (or youve heard of it but never actually given it a try) be sure to check out this video, which offers a comprehensive introduction to the software.

Free, open source software comes with its fair share of quirks, but Darktable (and the other popular option, RawTherapee) has served many an Adobe deserter very well for the price of on the house.

(via DPReview)

View post:
First Darktable 3.0 Release Candidate is Live with New Features and Major UI Improvements - PetaPixel

Telecom Italia partners with Google Cloud to expand its data centre business – Data Economy

In 1991, something called the Linux kernel made its first appearance among what was then a largely hobbyist software community, but it has since been the driving force for anything useful in managing the internet, the cloud and now the edge.

Were only two yearsoff the 30th anniversary of the Linux kernel, which gavethe open source software movement a turbo boost. At the annual OpenSource Summit Europe run by the Linux Foundation this week in Lyon,France, Data Economy attended to find out how open source willaddress the evolving needs of cloud, edge and IoT connectivity.

The first time thiswriter saw Linux creator Linus Torvalds give a presentation aboutopen source it was at an Informix database conference in Seattle in1998, and the big news from that event was that Informix hadintroduced an open source version of its database. Not that longafter the event IBM acquired Informix to confirm its own interest insupporting the open source development community, as well as makingmoney out of it.

And 20 years afterSeattle, IBM splashed out $34bn in 2018 on acquiring one of thebiggest names in open source Red Hat. And that same year,Microsoft, once a fierce opponent of open source, as it saw it as athreat to its proprietary software, spent $7.5bn on acquiring themain open source software development platform GitHub anotherLinus Torvalds creation.

Thats an awful lot ofmoney spent in two transactions, further confirming that open sourceis the environment that will support future productivity andconnectivity applications, whether in the cloud or at the edge which was demonstrated at the Open Source Summit.

Speakers at theconference repeatedly stated that open source is present at somelevel in 99% of new software being produced, with containers, cloudmanagement software Kubernetes and the Linux kernel continuing tobuild on top of the Apache servers that were already responsible forpowering most of the internet over 20 years ago.

Linus Torvalds (pictured left below) was interviewed on stage in front of many hundreds of conference delegates and was given the opportunity to again address the ever present niggling doubt in some quarters around the security of open source, particularly in relation to its use in embedded devices in safety critical environments.

The many tens ofthousands of Linux developers around the world arent concerned aboutthe safety of Linux of course, and thats not just because the Linuxkernel helps some of them put a little food on their table. AsTorvalds pointed out, when it comes to bugs that are regularlydiscovered in the constantly changing kernel, its not the kernelthat is simply deployed in the commercial and safety critical arena.

He said: Operatingsystems are complicated things. People are still cleaning up codethat has been around for years. The kind of bugs we see on desktopsare not the kind of thing we see in safety critical systems that arerepeatedly tried and tested. The kernel that we continually work onis not what is distributed by others for applications for automobilesand industrial environments. There are years of testing on thesoftware before it ends up in safety critical or real-time systems.

For his part, despitethe conference showing off various useful open source projectsdesigned to support and power new markets in the cloud and at theedge, Torvalds said he wasnt a programmer anymore and that henow wrote more email than code these days, advising Linuxdevelopers on how to get software updates across the line and managenew projects.

One of those projectsnow making its name at the edge is Zephyr, which is a small footprintpiece of software that can be used to manage devices ranging from IoTgateways and data storage solutions to gadgets including headsets,building security systems and even hearing aids located at the edge.

The Linux Foundationjust keeps churning such solutions out, and this one allowsorganisations to use open source where the Linux kernel is just toobig to be used in sensors and small circuits. Kate Stewart of theLinux Foundation helps to run the project and paints a rosy pictureon its takeup and future cloud industry backing.

She says: The likesof Google and Amazon Web Services are showing big interest in Zephyr,along with project members that include chip makers Intel and NXP.

A number of IoTproviders are building ecosystems to enable comprehensive solutionsthat address all segments of the market. This includes theinvolvement of Google, Microsoft and Amazon that have tailored IoTsolutions of their own. Each of these three can help partners andcustomers to securely provision, authenticate, configure, control,monitor and maintain all of their IoT devices.

Zephyr will make iteasier to process data at the edge where it is created, instead ofhaving to send it into the public cloud first, reducing latency andspeeding analytics performance.

Companies including Armare also expected to get seriously involved, as Zephyr will integratenicely with its Pelion Device Management offering, which aims toprovide simple, secure and flexible IoT management capabilities for arange of devices.

The Pelion IoT Platformconsists of three major components covering device management forprovisioning, identity and access management and updates;connectivity management to support wireless connectivity standardsfor any device; and data management for the analysis of trusted datafrom individual devices and enterprise-wide big data deployments.

Jim Zemlin, executivedirector of the Linux Foundation, enthused to conference delegates:Open source is now the building block for almost all products andservices. And we now want to extend the ecosystem to push standards.

Cloud service providers, telcos and other data connectivity providers should perhaps be grateful they can tap into the work of thousands of open source developers, who usefully dont even have to be on their payroll.

See original here:
Telecom Italia partners with Google Cloud to expand its data centre business - Data Economy

The U.S. military, algorithmic warfare, and big tech – VentureBeat

We learned this week that the Department of Defense is using facial recognition at scale, and Secretary of Defense Mark Esper said he believes China is selling lethal autonomous drones. Amid all that, you may have missed Joint AI Center (JAIC) director Lieutenant General Jack Shanahan who is charged by the Pentagon with modernizing and guiding artificial intelligence directives talking about a future of algorithmic warfare.

Algorithmic warfare, which could dramatically change warfare as we know it, is built on the assumption that combat actions will happen faster than humans ability to make decisions. Shanahan says algorithmic warfare would thus require some reliance on AI systems, though he stresses a need to implement rigorous testing and evaluation before using AI in the field to ensure it doesnt take on a life of its own, so to speak.

We are going to be shocked by the speed, the chaos, the bloodiness, and the friction of a future fight in which this will be playing out, maybe in microseconds at times. How do we envision that fight happening? It has to be algorithm against algorithm, Shanahan said during a conversation with former Google CEO Eric Schmidt and Google VP of global affairs Kent Walker. If were trying to do this by humans against machines, and the other side has the machines and the algorithms and we dont, were at an unacceptably high risk of losing that conflict.

The three spoke Tuesday in Washington, D.C. for the National Security Council on AI conference, which took place a day after the group delivered its first report to Congress with input from some of the biggest names in tech and AI like Microsoft Research director Eric Horvitz, AWS CEO Andy Jassy, and Google Cloud chief scientist Andrew Moore. The final report will be released in October 2020.

The Pentagon first ventured into algorithmic warfare and a range of AI projects with Project Maven, an initiative to work with tech companies like Google and startups like Clarifai. It was created two years ago with Shanahan as director following a recommendation by Schmidt and the Defense Innovation Board.

In an age of algorithmic warfare, Shanahan says the Pentagon needs to bring AI to service members at every level of the military so people with firsthand knowledge of problems can use AI to further military goals. Shanahan acknowledged that a decentralized approach to development, experimentation, and innovation will be accompanied by higher risk but argued that it could be essential to winning wars.

Algorithmic warfare is included in the National Security Council on AI draft report, which minces no words about the importance of AI to U.S. national security and states unequivocally that the development of AI will shape the future of power.

The convergence of the artificial intelligence revolution and the reemergence of great power competition must focus the American mind. These two factors threaten the United States role as the worlds engine of innovation and American military superiority, the report reads. We are in a strategic competition. AI will be at the center. The future of our national security and economy are at stake.

The report also acknowledges that the world may experience an erosion of civil liberties and acceleration of cyber attacks in the AI era. And it references China more than 50 times, noting the intertwined nature of Chinese and U.S. AI ecosystems today, and Chinas goal to become a global AI leader by 2030.

Its worth noting that the NSCAI report chooses to focus on narrow artificial intelligence, rather than artificial general intelligence (AGI), which doesnt exist yet.

When we might see the advent of AGI is widely debated. Rather than focusing on AGI in the near term, the Commission supports responsibly dealing with more narrow AI-enabled systems, the report reads.

Last week, the Defense Innovation Board (DIB) released its AI ethics principles recommendations for the Department of Defense, a document created with contributions from LinkedIn cofounder Reid Hoffman; MIT CSAIL director Daniela Rus; and senior officials from Facebook, Google, and Microsoft. The DoD and JAIC will now consider which principles and recommendations to adopt going forward.

Former Google CEO Eric Schmidt acted as chair of both the NSCAI and DIB boards and oversaw the creation of both reports. Schmidt was joined on the NSCAI board by Horwitz, Jassy, and Moore, along with former Deputy Secretary of Defense Robert Work.

At the conference on Tuesday, Schmidt, Shanahan, and Walker revisited the controversy at Google over Project Maven. When Googles participation in the project became public in spring 2018, thousands of employees signed an open letter protesting the companys involvement.

Following months of employee unrest, Google adopted its own set of AI principles, which includes a ban on creating autonomous weaponry.

Google also pledged to end its Project Maven contract by the end of 2019.

Its been frustrating to hear concerns around our commitment to national security and defense, Walker said, noting the work Google is doing with JAIC on issues like cybersecurity and health care. He added that Google will continue to work with the Department of Defense, saying This is a shared responsibility to get this right.

An understanding that military applications of AI are a shared responsibility is critical to U.S. national security, Shanahan said, while acknowledging that mistrust between the military and industry flared up during the Maven episode.

While the Maven computer vision work Google did was for unarmed drones, Shanahan said the backlash revealed many tech workers broader concerns about working with the military and highlighted the need to clearly communicate objectives.

But he argued that the military is in a state of perpetual catch-up, and bonds between government, industry, and academia must be strengthened for the country to maintain economic and military supremacy.

The NSCAI report also references a need for people in academia and business to reconceive their responsibilities for the health of our democracy and the security of our nation.

No matter where you stand with respect to the governments future use of AI-enabled technologies, I submit that we can never attain the vision outlined in the Commissions interim report without industry and academia together in an equal partnership. Theres too much at stake to do otherwise, he said.

Heather Roff is a senior research analyst at Johns Hopkins University and former research scientist at Googles DeepMind. She was the primary author of the DIB report and an ethics advisor for the creation of the NSCAI report.

She thinks media coverage of the DIB report sensationalized use of autonomous weaponry but generally failed to consider applications of AI across the military as a whole in areas like logistics, planning, and cybersecurity. She also cited AIs value in facilitating audits for the U.S. military, which has the largest budget of any military in the world and is one of the largest employers in the country.

The draft version of the NSCAI report says autonomous weaponry can be useful but adds that the commission intends to address ethical concerns in the coming year, Roff said.

People concerned about the use of autonomous weapons should recognize that despite ample funding, the military has much bigger structural challenges to address today, Roff said. Issues raised in the NSCAI report include service members being unprepared to use open source software or download the GitHub client.

The only people doing serious work on AGI right now are DeepMind and OpenAI, maybe a little Google Brain, but the department doesnt have the computational infrastructure to do what OpenAI and Deep Mind are doing. They dont have the compute, they dont have the expertise, they dont have the hardware, [and] they dont have the data source or the data, she said.

The NSCAI is scheduled to meet next with NGOs to discuss issues like autonomous weapons, privacy, and civil liberties.

Liz OSullivan is a VP of ArthurAI in New York and part of the Human Rights Watch Campaign to Stop Killer Robots. Last year, after voicing opposition to autonomous weapons systems with coworkers, she quit her job at Clarifai in protest over work being done on Project Maven. She thinks the two reports have a lot of good substance but that they take no explicit stance on important issues, like whether historical hiring data that favors men can be used.

OSullivan is concerned that a 2012 DoD directive mentioned in both reports that calls for appropriate levels of human judgement is being interpreted to mean that autonomous weapons will always have human control. She would rather the military adopt the idea of meaningful human control, such as has been advocated in the United Nations.

Roff, who previously worked in autonomous weapons research, said a misconception is that deployment of AI systems requires a human in the loop. Last-minute edits to the AI ethics report clarify a need for the military to have an off switch if AI systems begin to take actions on their own or attempt to avoid being turned off.

Humans in the loop is not in the report for a reason, which is [that] a lot of these systems will act autonomously in the sense that it will be programmed to do a task and there wont be a human in the loop per se. It will be a decision aid or it will have an output, or if its cybersecurity its going to be finding bugs and patching them on [its] own, and humans cant be in the loop, Roff said.

Although the AI ethics report was compiled with multiple public comment sessions, OSullivan believes the DIB AI ethics report and NSCAI report lack input from people who oppose autonomous weapons.

Its pretty clear they selected these groups to be representative of industry, all very centrist, she said. That explains to me at least why theres not a single representative on that board who is anti-autonomy. They stacked the deck, and they had to know what they were doing when they created these groups.

OSullivan agrees that the military needs technologists, but believes it has to be upfront about what people are working on. Concern over computer vision-based projects like Maven springs from the fact that AI is a dual-use technology, and an object detection system designed for civilian use can also be used for weapons.

I dont think its smart for all of the tech industry to abandon our government. They need our help, but simultaneously, were in a position where in some cases we cant know what were working on because its classified or parts of it might be classified, she said. There are plenty of people within the tech industry who do feel comfortable working with the Department of Defense, but it has to be consensual, it has to be something where they really do understand the impact and the gravity of the tasks that theyre working on. If for no other reason than understanding the use cases when youre building something, [it] is incredibly important to design [AI] in a responsible way.

Continued here:
The U.S. military, algorithmic warfare, and big tech - VentureBeat

‘Quantum supremacy’ and the threat it poses to data storage, digital economy – Economic Times

If data is the new oil, encryption is the engine that drives the digital economy. Everything from credit card transactions to health data stored on wearable devices is secured by cryptography. These complex algorithms, in turn, facilitate the safe use of the profusion of data generated every day.

The road to digitisation seems clear, but speedbumps abound. Last week, a team of researchers at Google claimed to have achieved quantum supremacy, a major milestone in computer science.

Our machine performed the target computation in 200 seconds and from measurements in our experiment we determined that it would take the worlds fastest supercomputer 10,000 years to produce a similar output, the announcement said.

This feat was achieved using a 54-qubit processor, named Sycamore that was crafted using high-fidelity quantum logic gates. A quantum computer possesses the capability to solve problems that are beyond the ambit of modern supercomputers. However, it risks undoing extant encryption standards, bringing the engine of the digital economy to a sputtering halt.

An artists rendition (left) of the Sycamore and the actual Sycamore processor (right). (Credit: Google) By truncating computing time from 10,000 years to a little under four minutes, quantum computers pose an existential threat to industry standards in cryptography that were hitherto thought to be infallible in real-world conditions. Cybersecurity experts have reason to be worried.

End-to-end encryption, the one employed by messaging platforms like WhatsApp, are considered secure as it is difficult to decrypt the coded message sent from one user to another if it is intercepted by hackers. Even the most sophisticated computers in use would take thousands of years to divine the required cryptographic key if it tried all possible combinations a practice known as brute force attack.

If quantum computers were to go mainstream, the use cases for cryptography would no longer be secure. The encryption used in professional network and in WiFi routers could be cracked in a matter of moments. Email and messaging services would be compromised. Banking transaction could be subverted, putting at risk the financial details of clients.

In its most basic form, an encryption algorithm is a math problem involving very large numbers. Encryption keys are hard to crack as they comprise of thousands of bits, making it difficult to determine the correct combination in real time. But the number of possibilities is finite, meaning that these algorithms are not foolproof if the computing power to process all combinations existed.

For instance, the 256 bit version of the Advanced Encryption Standard (AES) the standard used by WhatsApp would encode the data into cipher text that is 2256 long. It is probabilistically unlikely that one will have to skim through the whole list of possibilities before arriving at the right combination. Even if were possible to crack the code after trying out 50 per cent of the total permutations, the time taken would be inordinately long.

Chinas Tianhe-2 (MilkyWay-2), which is widely regarded as one of the fastest supercomputers on the planet, would take millions of years to crack 256-bit AES encryption. This is longer than the universes life span, as predicted by astrophysicists. However, cryptography would be turned on its head, if instead, the universe were to unexpectedly dissolve into a cloud of dust in the time it took you to make coffee?

This could pose a big problem to the way information is exchanged on the internet. The death of the universe, in this example, is tantamount to the achievement of quantum supremacy. Traditional computers use the binary system, where each digit is encoded in 0s and 1s.

Quantum computers can take up an infinite number of values between 0 and 1 using qubits or quantum bits. This implies that a large number of calculations can be made at any given point in time as each qubit can process more information that its equivalent in a classical computer.

Google has taken the lead in the quantum race, but modern cryptography could be thrown into jeopardy if such computers were to fall into the hands of malevolent actors or rogue governments. Businesses will have to devise new ways to safeguard sensitive data, with protection extending to data transmitted across a network, and that stored locally on hard disks.

Estimate of the equivalent classical computation time assuming 1M CPU cores for quantum supremacy circuits as a function of the number of qubits and number of cycles for the Schrdinger-Feynman algorithm. (Credit: Google) However, businesses have time to reorient their cybersecurity strategies given that quantum computing is still in its nascence. Quantum-proof encryption standards use algorithms that are inviolable to attack, regardless of the speed of the computer used. Most of these advanced techniques are lattice-based algorithms.

Unlike the classical encryption techniques in use today, lattice-based algorithms are impossible to crack owing to their organization in a virtual grid. The encryption key is hidden at the intersection point of a multidimensional lattice. Since the number of possibilities is infinite, quantum computers will be unable to leverage its advantage over classical computers as the number of permutations and the process of skimming through the range of possibilities is much more complex.

A rendering of lattice-based encryption. (Credit: IBM) The cryptographic key can be determined only if the attacker knows their way through the lattice, which is theoretically impossible as there is no way to compute the path. This form of tricky encryption that could stump quantum computers is currently offered by companies like SAFEcrypto and Privitar. Despite the latest breakthrough, researchers at Google are yet orders of magnitude away from attaining the computer power to crack such algorithms.

To mount a credible threat, scientists will need to fit in more qubits to the existing architecture. The Google Sycamore system that attained quantum supremacy had a 54-qubit processor. Moreover, the absence of standard libraries for lattice algorithms adds to the complexity of integrating software with quantum hardware.

While lattice-based encryption services are costly, large companies might want to consider using it to secure critical data that has a long shelf life. Transactional data that is generated in bulk every day does not arguably require that level of encryption as its value to hackers depreciates over time. The threat to national security, however, is more worrisome.

18 Oct, 2019

18 Oct, 2019

18 Oct, 2019

18 Oct, 2019

18 Oct, 2019

More:
'Quantum supremacy' and the threat it poses to data storage, digital economy - Economic Times

Unbound Tech Partners With Cryptosense to Verify Security of Virtual HSM – PRNewswire

NEW YORK, Nov. 5, 2019 /PRNewswire/ --Unbound Tech, a global leader in software-defined cryptography, today announced a new partnership with Cryptosense, the leading supplier of security analysis software for cryptography, to further verify the security of its virtual HSM. Unbound Tech will leverage the Cryptosense Analyzer Platform (CAP) to perform automated, systematic penetration tests of its Unbound Key Control (UKC), a virtual HSM and key management solution, and Crypto-of-Things (COT) virtual crypto key management and security solution.

Through this partnership, Unbound Tech will utilize the Cryptosense Fuzzer, a mutation-based fuzzing engine, to test the Unbound Key Control (UKC) and Crypto-of-Things (COT) PKCS#11 implementations. By sending commands to a device's PKCS#11 interface and logging the responses, the Cryptosense Fuzzer will test traces of exchanges between an application and a cryptographic library to ensure these virtual appliances are properly secured in the event of a PCKS#11 API attackone of the most common attacks on HSM and Virtual HSM devices.

"Our software enables our customers to move securely to cloud cryptography services," said Graham Steel, CEO of Cryptosense. "CAP is the only tool on the market that provides everything you need for a secure and simple migration from start to finish. Our software looks inside a running application to see what cryptography is really being used, tests the use of the cloud crypto service to check for vulnerabilities and monitors the security of the migrated application in the cloud. By partnering with Unbound, we're able to reassure our customers of the continued security of their Virtual HSM and the applications that use it."

Testing with the Cryptosense Analyzer is the latest step in a series of third-party security validations in support of Unbound's virtual HSM. In early 2019, UKC also received FIPS 140-2 Level 1 and Level 2 certification from the U.S. National Institute for Standards and Technology (NIST). They are the first and only vendor to obtain FIPS 140-2 certification for a cryptographic module that spans multiple separate machines and uses secure multiparty computation (MPC) rather than relying on physical security measures to protect keys.

"There are often misconceptions around the level of security provided and benefits of protecting encryption keys with virtual appliances versus traditional HSMs," said Guy Peer, Co-founder at Unbound Tech. "The security provided by Unbound Key Control has now been industry tested and proven to be equal to, if not better, than that provided by a physical HSM. UKC is an operational and cost-friendly alternative to hardware that provides scalable key management and secure encryption from both physical and software-based attacks, while running on any existing physical or cloud infrastructure. With Cryptosense's stamp of approval, our clients can now feel more confident in adopting this approach to securing their sensitive information."

As a software-only solution, UKC offers unique benefits not common with physical HSMs - requiring minimal effort to setup, use and maintain in a variety of environments and application delivery models. All key management and user management operations are fully automated using the CLI or REST API, giving companies the ability to scale up or down, create partitions and users, register clients and revoke keys immediately across their entire global infrastructure from a single pane of glass.

About Unbound Tech:

Unbound Tech equips companies with the first pure-software solution that protects secrets such as cryptographic keys, credentials or other private data by ensuring they never exist anywhere in complete form. The Unbound Distributed Trust Platform stands as a new foundation for trust using secure multiparty computation to ensure secrets are always split into multiple shares and thereby eliminate any single point of compromise. Adopted by Fortune 500 companies, Unbound's elastic and agile platform protects secrets on untrusted infrastructure and removes existing dependence on dedicated security hardware, delivering a novel approach to security and privacy designed for the digital era. Serving as an engine for uninhibited growth, it allows enterprises to gain new levels of control over their secrets on any cloud, server or endpoint, and opens new possibilities for digital innovation. Founded in 2014, Unbound has been recognized with numerous industry awards and named in multiple Gartner Hype Cycle Reports. Be Trusted. Be Unbound. Visit unboundtech.com.

About Cryptosense:

Cryptosense provides software to manage cryptography throughout an organization, enabling innovation and simplifying compliance. The Cryptosense Analyzer Platform discovers cryptography use inside applications and verifies use of secure hardware, both on-premise and in the cloud. Adopted by major financial institutions and payment infrastructure providers worldwide, Cryptosense is built on years of academic research. Customers use it to save time and money by automating audits, operate securely using cloud cryptography services, and integrate crypto testing into the CI/CD toolchain. For secure cryptography everywhere, visit Cryptosense.com.

SOURCE Unbound Tech

Excerpt from:
Unbound Tech Partners With Cryptosense to Verify Security of Virtual HSM - PRNewswire

Blockchain Must Solve These 3 Issues to Avoid Quantum Threat: Expert – Cointelegraph

The blockchain community should immediately begin working on three issues to prevent being overtaken by quantum computers, a cryptography expert says.

Xinxin Fan, head of cryptography at privacy- and IoT-focused blockchain platform IoTeX, published an article in The International Business Times on Nov. 7, calling on the blockchain community to stay up to date about the progress being made on quantum computers.

While reiterating that short-term developments in quantum computing are modest, Fan argued that blockchains will have to keep pace to avoid being overtaken by quantum computers as the technology grows and improves.

As such, Fan outlined three major directions for the blockchain community to address as soon as possible, which are the standardization of quantum-resistant cryptography, cryptographic agility and blockchain governance.

According to the expert, the first direction is a process to standardized quantum-resistant cryptography as it develops. Fan noted that quantum-resistant cryptography tech has already been initiated by the National Institute of Standards and Technology.

Stressing the need for such standardization, Fan wrote:

Developing and implementing capabilities specifically designed to resist quantum computers will be key for the future of blockchains, as well as their survival. Blockchain supporters and developers should therefore closely monitor the standardization process and prepare to integrate the results into existing and future blockchain projects.

Next is cryptographic agility. Simply put, this concerns developers ability to implement quantum-resistant upgrades to existing blockchain networks.

The expert cited the Ethereum network as an example, emphasizing the importance of such platforms being able to regularly upgrade their systems due to the large number of projects that depend on them.

The third important issue is blockchain governance. According to Fan, blockchain projects must set up procedures to clearly define when and how to deploy quantum-safe upgrades to their networks.

Given the difficulty blockchains have faced in establishing optimal governance structures, the expert argued that the blockchain community should start seriously thinking and experimenting with ways to ensure governance is not a hindrance to the improvement of technology.

He concluded:

There is no doubt that quantum computing is coming, and it will have major effects across the technology space. But those who believe that its simple existence is a death knell for blockchain fail to consider that the latter will grow and evolve alongside quantum computing. There is much that can be done to make blockchains more dynamic and robust and if we do those things, we will not have to worry about quantum supremacy any time soon.

On Oct. 25, Ethereum co-founder Vitalik Buterin delivered his opinion on the issue of quantum supremacy, saying:

My one-sentence impression of recent quantum supremacy stuff so far is that it is to real quantum computing what hydrogen bombs are to nuclear fusion. Proof that a phenomenon and the capability to extract power from it exist, but still far from directed use toward useful things.

Previously, Bitcoin (BTC) educator Andreas Antonopoulos claimed that Google's latest developments in quantum computing have had no impact on Bitcoin.

Read more here:
Blockchain Must Solve These 3 Issues to Avoid Quantum Threat: Expert - Cointelegraph

Novogratz States that Xi Jinping has Credentialized The Crypto Industry – Inside Bitcoins

Last Updated on November 7, 2019

Micheal Novogratz, the founder of the crypto investment bank Galaxy Digital, gave an interview about his opinion of Xi Jinpings newfound positive words for blockchain technology. Novogratz believes that Xi giving a public announcement urging his people to embrace blockchain technology, has profoundly increased cryptocurrency credibility. He gave this opinion at the Reuters Global Investment Outlook 2020 Summit that happened in New York on the 5th of November.

Xi Jinping stated on the 24th of October that his people should embrace blockchain technology as a critical facet of future technologies. Novogratz considers this act something that credentialized both cryptocurrencies and the blockchains that theyre based on.

While China is embracing the use of blockchain technology, they have yet to embrace the cryptocurrencies along with it. It was an amusing clarification China had to do after the price of Bitcoin skyrocketed following Xis announcement. The Peoples Daily, the Chinese Media Outlet, stipulated that Beijings pro-blockchain sentiment is true, but they are still very anti-cryptocurrency.

Even with that statement in mind on the 6th of November, China has already made it clear that they would be in favor of a bitcoin mining operation in the country, going in contradiction of their most absolute assurances that the country has no intention allowing crypto.

While the trading of cryptocurrencies in China is banned, a new law was passed by the Standing Committee of the 13th National Peoples Congress of China. This new law passed on the 26th of October and concerns legislation over the application of cryptography and password management in the country.

Cryptography is the reason why coins are so hard to hack. The Peoples Republic of China has now told the world they are embracing blockchain and put in laws regarding cryptography and its uses that will become active starting next year. Its unclear if the PRC believes were all stupid, or if theyre doing all the workarounds to save face.

A Chinese economics think tank that happened in October, going by the name of the China Center for International Economic Changes, held a Chinese exec with different opinions. This exec predicted that China would be the first country to develop and implement a digital currency successfully.

Many things can be said about the Chinese government, but inefficient is not one of those words. The legislation regarding cryptography will be put into effect on the 1st of January 2020. With this information in mind, the Chinese digital currency will roll out next year as well, probably within the first quarter.

Anyone who can think, can see that China is gearing up for its national cryptocurrency. After its launch, the crypto exchanges will probably be opened up again with some sort of stipulation that benefits the Chinese government wholeheartedly.

View post:
Novogratz States that Xi Jinping has Credentialized The Crypto Industry - Inside Bitcoins

An introduction to auditing DLT and blockchain enterprises – Times of Malta

The audit domain is facing clients who are interested in Initial Coin Offerings (ICOs), cryptoexchanges, digital wallets and other similar projects which will be requiring financial statement or other types of assurances services, raising various challenges both on the audit side and the regulatory side. The audits challenges are mainly due to a number of factors which will perhaps take longer to understand and adapt to, such that this article considers some of the salient particularities in auditing DLT-centric clients.

Due to the particularities of DLT and blockchain technology, personnel forming part of the financial statements audit team will need to understand the technology itself, which often requires specialisation in IT auditing, cryptography and historical knowledge of the technology. In addition, legal considerations need also be taken into consideration, especially when auditing smart contracts and their derivatives.

Furthermore system audits need to be performed by personnel that are aptly educated an experienced in or at the very least have a strong base in ITC, assurance and accounting and legal aspects of DLT technology.

Some of the practitioners involved in the audit of DLT technologies have proposed specialised and specific International Auditing Standards (IAS) specifically for tackling DLT audits. To date, literature is largely unknown, and the few pieces which are available on the subject matter of auditing DLTs are by unknown and unverified sources.

Developing industry-adhered guidelines in order to ensure that an adequate level of assurance is given to the public is a prerequisite. More so, regulators will need to understand that the development of guidelines will require adaptation and must remain flexible. Furthermore a hybrid of an auditor-software-engineer-lawyer role or a team of such professionals tightly-knit and working seamlessly will be necessary to cater for DLT-intensive clients from an audit perspective. Such a role or team would entail significant support and investment for audit entities as they would have to furnish specific training for their personnel.

The rapid development of the technology and also to a certain extent the volatility of some of the various implementations of DLT technology (cryptocurrencies) again pose substantial challenges from an audit perspective. A team composed of specialist DLT auditors is a must for the technology itself is also complex, touching on compound mathematics, cryptography, networking, economics and finance.

Moreover, different countries and/or economic-cooperation zones have adopted different positions in relation to DLT technology, or are playing a wait-and-see game, which creates a scenario whereby the same transaction is treated differently in one domicile as against another for law and accounting purposes.

While the above highlights some of the major challenges of auditing enterprises involved in DLT technology, the adoption of DLT by the client under review in itself could enhance the audit process. DLT technology is designed in such a manner where if structured correctly, with the right tools, it would provide an auditor a level of assurance which would otherwise not be available in reviewing non-DLT clients. The technology of itself could increase or enhance transparency , especially in tracing and tracking transactions through the audit chain, with the real possibility of the permanent ledger being available for recomputations and tracing beyond the period under testing, giving an auditor more options in testing data. In confirming the Ledger itself, an auditor should be in a position to place reliance on the completeness and accuracy of the transactions within, a unique advantage for an auditor.

The adoption of DLT by the client under review in itself could enhance the audit process

Also, in the long run by embracing a number of tools the audit process could become more risk-focussed, while at the same time cheaper to conclude on.

On a general note, in order to cater for DLT clients and support our Blockchain Island, Maltese professionals, from auditors to lawyers, will need to continue investing significant time and resources in order to stretch and strengthen their skill set to prepare for what is surely to be an exciting time for the Maltese economy.

Here is the original post:
An introduction to auditing DLT and blockchain enterprises - Times of Malta