The Microsoft Team Racing to Catch Bugs Before They Happen – WIRED

As a rush of cybercriminals, state-backed hackers, and scammers continue to flood the zone with digital attacks and aggressive campaigns worldwide, its no surprise that the maker of the ubiquitous Windows operating system is focused on security defense. Microsofts Patch Tuesday update releases frequently contain fixes for critical vulnerabilities, including those that are actively being exploited by attackers out in the world.

The company already has the requisite groups to hunt for weaknesses in its code (the red team") and develop mitigations (the blue team). But recently, that format evolved again to promote more collaboration and interdisciplinary work in the hopes of catching even more mistakes and flaws before things start to spiral. Known as Microsoft Offensive Research & Security Engineering, or Morse, the department combines the red team, blue team, and so-called green team, which focuses on finding flaws or taking weaknesses the red team has found and fixing them more systemically through changes to how things are done within an organization.

People are convinced that you cannot move forward without investing in security, says David Weston, Microsofts vice president of enterprise and operating system security whos been at the company for 10 years. Ive been in security for a very long time. For most of my career, we were thought of as annoying. Now, if anything, leaders are coming to me and saying, Dave, am I OK? Have we done everything we can? Thats been a significant change.

Morse has been working to promote safe coding practices across Microsoft so fewer bugs end up in the companys software in the first place. OneFuzz, an open source Azure testing framework, allows Microsoft developers to be constantly, automatically pelting their code with all sorts of unusual use cases to ferret out flaws that wouldnt be noticeable if the software was only being used exactly as intended.

The combined team has also been at the forefront of promoting the use of safer programming languages (like Rust) across the company. And theyve advocated embedding security analysis tools directly into the real software compiler used in the companys production workflow. That change has been impactful, Weston says, because it means developers arent doing hypothetical analysis in a simulated environment where some bugs might be overlooked at a step removed from real production.

The Morse team says the shift toward proactive security has led to real progress. In a recent example, Morse members were vetting historic softwarean important part of the groups job, since so much of the Windows codebase was developed before these expanded security reviews. While examining how Microsoft had implemented Transport Layer Security 1.3, the foundational cryptographic protocol used across networks like the internet for secure communication, Morse discovered a remotely exploitable bug that could have allowed attackers to access targets devices.

As Mitch Adair, Microsofts principal security lead for Cloud Security, put it: It would have been as bad as it gets. TLS is used to secure basically every single service product that Microsoft uses.

Read the original:

The Microsoft Team Racing to Catch Bugs Before They Happen - WIRED

The Industry Handbook: Software Industry | Global Online Money – Global Online Money

Software program is differentiated from {hardware} because the algorithm that enable providers to be carried out on the bodily system. The software program business is absolutely solely a small a part of the general pc programming exercise that takes place, because it pertains to software program traded between software program producers and software program shoppers. Many software program packages created in-house for very particular makes use of are by no means bought exterior of the corporate. For the reason that businesss starting within the Nineteen Fifties, it has gone by a variety of revolutionary adjustments, from easy punch-card programming providers provided to these few firms that had computer systems in 1955 to revolutionary traits similar to software program as a service (SaaS), system programming for the Web of Issues (IoT) and open-source options acceptance by main firms.

The software program business could be separated into 4 foremost classes: programming providers, system providers, open supply and SaaS. The next describes the classes of enterprise software program used within the business.

Programming Providers this sector has traditionally been the most important sector and contains names similar to Microsoft Company (NASDAQ: MSFT), Automated Knowledge Processing, Inc. (NASDAQ: ADP), Oracle Company (NYSE: ORCL) and SDC Applied sciences, Inc. These firms usually pioneered options to wants by companies to research information, retailer and arrange information, or present packages to run equipment.

System Providers though programming was the most important software program sector early in pc historical past, system providers grew quickly by the Sixties and Nineteen Seventies, after which exploded within the Eighties with the rise of non-public computer systems (PCs) and the necessity for an encompassing working system similar to Microsofts unique disk working system (DOS) that was launched in 1981.

Open Supply programming or software program engineering has change into an enormous in-demand occupation with the expansion of the Web, cloud methods and companies prepared to enterprise extra willingly into open-source environments such because the Linux working system. Open supply refers to a code base that was created and is free to amass. Nevertheless, most companies require adjustments to be made to the code bases to swimsuit their wants. One other open-source code base is the Android working system.

Software program as a service with the rise of cloud computing and the motion of most companies massive and small to the cloud, SaaS has change into extra well-liked than system software program for companies particular wants. This software program is saved on the creators servers and shoppers entry the software program by the Web, additionally known as the cloud. All upgrades, patches and points are dealt with on the creator facet with a subscription-based mannequin for the consumer. The SaaS sector is forecast for steady progress over the following decade, representing nearly 30% by 2018. By the tip of 2016, its forecast that over 80% of all companies will incorporate at the least one element of cloud computing inside their info expertise (IT) infrastructures, similar to infrastructure as a service (IaaS), platform as a service (PaaS) or SaaS packages.

SaaS suppliers are vying for market share by attempting to supply essentially the most providers inside their choices to cater to as many conditions as potential. Zohos suite of apps or Oracles motion into software program modules are nice examples of how software program firms are creating into large modular-based methods the place companies can plug within the essential parts for his or her scenario. The mannequin is engaging to companies of all sizes as a enterprise solely must pay for the modules, similar to packages and apps, it requires to run its enterprise, and most of those SaaS merchandise are nearly immediately scalable if the enterprise must develop.

With the arrival of the Web and cloud computing, the pc software program business has radically modified how firms work together with, develop and use software program. Software program was as soon as a product that was bought, put in and maintained. In 2016, an increasing number of firms are utilizing software program in a subscription mannequin the place all the event, upkeep and maintenance of this system is finished by the unique creator. (For associated studying, see 8 Software program Expertise At the moment In Demand)

Read the original:

The Industry Handbook: Software Industry | Global Online Money - Global Online Money

Truth Social is shadow banning posts despite promise of free speech – Business Insider

Former President Donald Trump's social-media company, Truth Social, has marketed itself as a "free speech haven" that cherishes free expression.

But since its rocky start when it partially launched in February, its moderators have removed or limited the visibility of users' posts, often without explanation, according to a new investigation from the nonprofit left-leaning consumer-advocacy organization Public Citizen.

The removed or limited posts included anti-Trump content about the US House investigation of the January 6, 2021, attack on the Capitol as well as posts supporting abortion rights. It also blocked content that didn't have any clear anti-Trump or anti-conservative message, the report says.

The author of the report, Cheyenne Hunt-Majer, told Insider she started experimenting with posts on Truth Social after hearing that people were getting kicked off the platform for expressing progressive or anti-Trump sentiments.

"It became apparent for me within the first 15 minutes that things were being blocked," said Hunt-Majer, a Big Tech accountability fellow at Public Citizen who studies content moderation across social-media companies.

As part of the experiment, Hunt-Majer wrote "abortion is healthcare" in a post and soon found it was being "shadow banned" meaning it appeared to publish but she couldn't find it anywhere on the website. She received no notice that the post was hidden from public view or why.

Hunt-Majer posted a TikTok about the experience which went viral and the abortion post appeared five days later. She then approached her employer about writing a formal report about Truth Social, the findings of which published Tuesday.

Her investigation found that Truth Social "shadow banned" a post she wrote comparing firearms regulations to abortion and birth control. It found the same result for a post she wrote about Wandrea "Shaye" Moss, a Georgia election worker who testified at a House January 6 hearing.

"Shadow banned" content wasn't limited to Democratic policy positions, the Public Citizen report found. For instance, users found a post about Blake Shelton in favor of gun ownership, as well as another post that included a link to an article on the far-right website Breitbart were "shadow banned."

After users complained they couldn't post a quote criticizing US support for Ukraine, Hunt-Majer also tried to publish the quote but it wouldn't show up.

Truth Social didn't immediately respond to a list of questions from Insider about how it moderates content. Its website policies call shadow banning a "deceptive and manipulative practice" and promise the company "does not, and never will, shadow ban its users."

The company's website also says it has to engage in some moderation to "prevent illegal and other prohibited content" and does so partially through artificial intelligence. Human moderators then review items that have been flagged or deleted, and users can get barred for threatening violence, posting porn, or infringing on intellectual-property rights.

The company acknowledges the process "is not error-proof" and says it identifies and corrects any mistakes in removing posts.

But Hunt-Majer said the policies clashed with the company's actions.

"They're taking a public stance on shadow banning and censorship, and then there is a reality of what is going on on the platform, which doesn't match up," Hunt-Majer said.

She wasn't able to get ahold of representatives at Truth Social, she said, but hypothesized that not all the shadow banning was nefarious.

"You can tell from using the platform, just trying to get on, you can tell it's being strung together by a handful of people who are not capable of putting a social-media site together," she said. "It's not user-friendly."

A few conservative social-media alternatives have emerged since Twitter and Facebook booted Trump from their platforms, saying he incited violence on January 6.

This year Trump has been using Truth Social largely to rant about the House January 6 Committee, to endorse Republicans in the 2022 primaries, and to mock President Joe Biden.

He counts 3.4 million followers a fraction of the 88.7 million he had when he was on Twitter.

But his comments on Truth Social most likely have a much further reach because journalists and Republicans often share screenshots on Twitter of his comments. Trump, who regularly hints that he'll run for the White House again in 2024, has said he wouldn't return to Twitter even if allowed.

Hunt-Majer called content moderation a "difficult animal," saying social-media companies often expressed a desire to keep an open dialogue on their websites only to soon run into the realities of what that'd mean in practice.

"People don't want to be on a platform where hate speech is rampant and you're getting bombarded with explicit images or lots of violence," she said.

Truth Social has prohibitions such as "offensive or sexual content," which includes language. It also bans depictions of "violence, threats of violence, or criminal activity" and speech that is "false, inaccurate, or misleading."

Republicans often complain that Twitter blocks or suspends them more frequently than it does Democrats, and they also accuse Twitter's employees of having bias against conservatives. Twitter employees have overwhelmingly donated to Democrats over Republicans, according to data compiled by the nonpartisan research organization OpenSecrets.

Twitter also censored the New York Post's reporting on emails from the laptop of Biden's son Hunter ahead of the 2020 election. Biden's allies called the emails on the laptop "Russian disinformation," but The New York Times and Washington Post have since confirmed the emails were authentic.

Democrats, too, have seethed at social-media giants, pushing them to be stricter about clamping down on falsehoods, hate speech, and language that incites violence.

Hunt-Majer said she also took issue with how platforms such as Twitter and Facebook moderated content, saying they inconsistently applied their provisions about hate speech and incitement of violence.

Those platforms, however, alert users when their posts are taken down and why and provide an appeals process, Hunt-Majer said. Public Citizen's position in the report is that content moderation should be transparent and consistent and carry some nuance.

Hunt-Majer's concern is that Truth Social users will think they're in an open forum that welcomes diverse perspectives but will instead be in an "echo chamber" that will incite violence.

"It's a recipe for radicalism and extremism," she said.

Here is the original post:

Truth Social is shadow banning posts despite promise of free speech - Business Insider

David Op’t Hof: Only banning assault weapons will stop the slaughter – Salt Lake Tribune

(AP Photo/Michael Conroy)Bryan Oberc, Munster, Indiana, tries out an AR-15 from Sig Sauer in the exhibition hall at the National Rifle Association Annual Meeting in Indianapolis, Saturday, April 27, 2019.

| July 28, 2022, 3:00 p.m.

Today on my way back from the store, I came upon a father and daughter riding their bikes. As they came towards me, I couldnt help noticing the little girls huge smile. She was about 3 or 4 and her short legs were pedaling as fast as could be. I smiled as I remembered what a big milestone it is in the life of a child to learn how to ride a bicycle.

For a moment, a shadow passed over my mind as I remembered the children killed at Uvalde, Sandy Hook, Columbine and Parkland and how they will never ride a bike again, nor will they ever teach their children to ride a bike.

Why are we tolerating the slaughter of innocent children at schools? For that matter why are we tolerating the mass murder of innocent Americans in stores, malls and the workplace. The common denominator in most shootings is an AR-15 assault-style rifle developed for the military, where soldiers need to be able to shoot a lot of bullets in a hurry to stop the assault of an enemy.

There is no valid use of assault rifles by ordinary citizens. Hunting? I pity the hunter who needs an assault rifle to bag a deer. Protecting your family from a burglar? A handgun is far more appropriate.

Some have suggested arming teachers. Will teachers have AR-15s and body armor? Thats the only way a teacher could stop a shooter who bursts into a classroom and opens fire on her students.

The gun control legislation recently passed by Congress is a good start, and they deserve our praise for doing something. But the Safer Communities Act doesnt do enough. We need a ban on the sale of assault-style weapons.

The Big Lie promoted by the NRA and other gun advocacy groups is that if Congress passes gun control, theyre going to take away all your guns. Well, did anybody come take your guns when the new gun control law was passed? Nobody wants to take your guns. Not even your AR-15. Keep them. But outlaw the sale of assault rifles from this day on. Its time to be pro-life for the born as well as the unborn.

Heres a few examples of what happens when a shooter does not have a semi-automatic rifle:

1. On November 7, 2021, a gunman opened fire at the Nashville Light Mission Pentecostal Church. He approached the altar while waving a gun in the air. The pastor tackled the gunman before he fired any shots. No one was killed.

2. On May 16, 2022, a gunman opened fire on parishioners at the Geneva Presbyterian Church in Laguna Woods California. While he paused to reload, Pastor Billy Chang hit him with a chair and bystanders hog-tied the shooter with an electrical cord. Four people were killed in this incident. Too many, but less than 20.

3. On May 17, 2022, a gunman opened fire at a church potluck at the St. Stephens Episcopal Church near Birmingham, Alabama. A church member hit the shooter with a chair and pinned him to the ground until law enforcement arrived. The shooter had a handgun. Three people died in this incident. Still too many, but lots less than with an assault rifle.

When a shooter has a handgun, bystanders have a chance to stop them. When the shooter has an AR-15, many people will be mowed down before anyone can stop him.

It is time to ban the sale of assault rifles. Thats the only way to stop the slaughter at our schools, parades and businesses.

David Opt Hof, Lehi, is a retired educator, writer and philosopher.

See original here:

David Op't Hof: Only banning assault weapons will stop the slaughter - Salt Lake Tribune

What is Monero (XMR) Crypto? Is Edward Snowden Behind This Project too? – CryptoTicker.io – Bitcoin Price, Ethereum Price & Crypto News

The cryptocurrency world is full of surprises and mysteries. This article is all aboutwhat is MoneroXMR Crypto and whether Edward Snowden behind the project? Lets take a look at it in more detail.

Monero is a cryptocurrency that has a high degree of anonymity. It is a decentralized cryptocurrency that operates a public distributed ledger infused with privacy-concentrated technologies to achieve anonymity. It is also an open-source technique that demonstrates that observers cannot analyze transactions and activities about its cryptocurrency.

Moneros blockchain design is unique, and all transaction details from the sender to the receiver are kept secret. Despite preserving similarities with well-known cryptocurrencies like Bitcoin, Monero is completely distinct in its function. It currently has the most comprehensive community of developers, after Bitcoin and Ethereum. Like Bitcoin and Ethereum, users can mine Monero, and the process isneutral.

Monero relies onproof-of-work. It is an algorithm that provides security to the cryptocurrency. This consensus instrument prevents problems like double-spending, which canfudgethe supply. When this happens, it will show much more than actually available tokens. Monero employs ring signatures and stealth addresses to deliver user privacy. The concept of ring signatures focuses on covering the particulars of an individual in a bunch of people. It is like a digital signature from the individual that helps others in the dark about the transaction.

>> CLICK HERE TO TRADE MONERO <<

Monero executes Cryptonode, a protocol that covers all functions on the blockchain. Each recipient accepts a special address for each transaction, a so-called stealth address, which cannot be allocated to his public address. The recipient can utilize his private key to recognize the transaction on the blockchain.

The sender is covered by so-called ring signatures. Random transactions on the blockchain are blended with valid transactions. The miners can employ a cryptographic method to ensure that one of the transactions in the ring signature was signed with a valid key. But you dont know which ones. So, looking at the blockchain, you cant divulge which of the transactions was published. The number of transactions for the ring signature is inconsistent. The more participating transactions there are, of course, the more safe the whole thing is.

Like every year,Coindeskpitches its yearly Consensus conference. This assembly has been the key meeting place for people committed to a decentralized world since 2015. It is one of the few worldwide affairs that celebrate all sides of blockchain tech. For this year 2022 particularly, we atCryptoTickerpartook in thefull conference schedule. There were many speakers and one of them was a prominent personality, Edward Snowden.

Edward Snowden, the NSA whistleblower whose leaks flared a worldwide debate over internet vigilance, is declared to have had a major role in the evolution of one more privacy coin Zcash (ZEC). The ex-US defense employee was one of six people who participated in the ritual that launched Zcashs so-called authorized structure. The whistle-blower has admitted that he was the sixth person who partook in a detailed 2016 ceremony that ushered in the invention of zcash, a top privacy-protecting coin. Now, whether he is behind Monero or not is not clear yet.

XMR/USDT Weekly chart GoCharting

At the time of writing this, the XMR price is sitting at $159.37. It is important to mention that after the XMR price dropped by almost 50% in May, which was little compared to other cryptocurrencies, the price is slightly increasing. The price movement of XMR is creating a customers hedge zone. Buyers could form a 40-day high at the $155 mark, where buyers labored under this area.

Buyers must break this bullish railing as soon as possible, more proliferation could prefer an additional withdrawal. Although buyers are hardly driving higher XMR coin prices, they appear to be shutting out near the $150 to $155 resistance area. Meanwhile, the market cap has increased by 7% to $1.7 billion in the past 36 hours. Likewise, trading volume rose by 37% approximated to the last night, implying more than average buying in the last 24 hours.

Monero (XMR) token could split its most contemporary bullish railing at $155. And buyers must split this bullish railing as soon as possible, more proliferation could prefer an additional pullback.The Support levels are $100 and $78 and the resistance level are $162 and $200.

In the past 2 days though, we noticed a slight crypto correction lower. Is now the time to buy cryptos

Ethereum based Layer 2 solutions are all the rage, how can you invest in this lucrative market? What are the

Go here to read the rest:
What is Monero (XMR) Crypto? Is Edward Snowden Behind This Project too? - CryptoTicker.io - Bitcoin Price, Ethereum Price & Crypto News

Russian hackers get the headlines. But China is the bigger threat to many US enterprises. – Protocol

While cybersecurity teams would be unwise to take their eyes off Russia, the evolving threat posed by China's massive hacking operation deserves more attention than it's getting among some targeted businesses especially those involved in emerging technologies, experts told Protocol.

As the tech war between China and the U.S. heats up, cyber threat experts said the recent FBI warnings about the Chinese government's efforts to steal intellectual property line up with the realities they see.

"Our government is correct: Companies actually need to pay more attention," said Lou Steinberg, formerly the CTO at TD Ameritrade.

In recent years, threats from Russia have driven much of the cybersecurity attention and investment among businesses in the U.S. and Western Europe, especially after Russias invasion of Ukraine in February. Understandably, the threat of ransomware and disruption of critical infrastructure tends to provoke a response.

But when it comes to state-sponsored intrusions, China was behind a stunning 67% of the attacks between mid-2020 and mid-2021, compared to just 1% for the Russian government, according to data from CrowdStrike.

Without a doubt, China "stands out as the leading nation in terms of threat relevance, at least for America," said Tom Hegel, a senior threat researcher at SentinelOne.

In July, the FBI and MI5 issued an unprecedented joint warning about the threat of IP theft by China. During an address to business leaders in London, FBI Director Christopher Wray said that China's hacking program is "bigger than that of every other major country combined" and that the Chinese government is "set on stealing your technology whatever it is that makes your industry tick."

"The Chinese government poses an even more serious threat to Western businesses than even many sophisticated businesspeople realize," Wray said.

During his three years as a researcher at Secureworks, Marc Burnard has seen Chinese government hackers go after customers in chemicals manufacturing, aviation, telecommunications and pharmaceuticals to name just a few.

"It's quite difficult to point out what the key sectors are for China, because they target so many," Burnard said. "It's a scale that just completely dwarfs anything from the likes of Iran, North Korea and Russia."

One of the most brazen examples was China's release of bomber jets with strikingly similar designs to the F-35 starting in 2011, according to Nicolas Chaillan, former chief software officer for the U.S. Air Force. Documents leaked by former NSA contractor Edward Snowden appeared to confirm that Chinese government hackers stole data on the F-35 Lightning II, which is believed to have been used in the design of Chinese jets including the J-31 and J-20.

Chaillan who resigned in protest over the military's progress on IT modernization amid the China threat said the recent FBI warning on China is telling. "It takes a lot for the government to start saying stuff like that," he told Protocol. "That usually gives you a hint that it's really, really bad."

China "stands out as the leading nation in terms of threat relevance, at least for America."

Wray has made a number of public remarks on the China cyber threat this year. In a January speech, he said the FBI had 2,000 open investigations related to attempted theft of technology and information by the Chinese government. The FBI is opening a new case related to Chinese intelligence roughly every 12 hours, he said at the time.

In July 2021, the White House denounced the Chinese government over its "pattern of malicious cyber activity," in tandem with the European Union, the U.K. and NATO. The action made it clear that the Biden administration believes China has been ignoring its 2015 agreement to cease hacking activities meant to steal the IP of U.S. businesses.

Major incidents have included the Chinese government's widespread exploitation of vulnerabilities in Microsoft Exchange in 2021, which led to the compromise of 10,000 U.S. companies' networks, Wray said in January.

In analyzing the Chinese cyber threat, the key is to understand the larger context for why China is targeting Western IP, said Michael Daniel, formerly cybersecurity coordinator and special assistant to the president during the Obama administration.

"China is an expanding power that fundamentally sees itself as challenging the West, and challenging the world order that the Western European system has set up," Daniel said.

A central part of that aspiration is challenging the West economically, but China is prone to taking shortcuts, experts say.

The Chinese government laid out its "Made in China 2025" strategy, which identifies the industries that it considers to be most important going forward, in 2015. The document is extremely helpful when it comes to defending against IP theft by China's government, said Daniel, who is now president and CEO of the Cyber Threat Alliance, an industry group.

"If your company is in one of those industries identified in that strategy, you are a target for Chinese intelligence," he said. "It's that simple, actually."

Some of the industries that now face the biggest threat of IP theft from China such as energy, aerospace defense technology and quantum computing are already well aware of it, according to Steinberg, now the founder of cybersecurity research lab CTM Insights.

But other industries should be paying closer attention than they are, he said. Those include the AI/robotics, agricultural technology and electric vehicle sectors which are among the industries mentioned in the "Made in China 2025" plan.

"If you're on their list, they've got an army of skilled people who are trying to figure out how to get your intellectual property," Steinberg said.

"If your company is in one of those industries identified in that strategy, you are a target for Chinese intelligence."

Christian Sorensen, formerly a U.S. Cyber Command official and U.S. Air Force officer, said there's been a clear shift in China's IP theft priorities from its traditional focus on defense-related technologies such as the designs for the F-35 and into the high-tech and biotech sectors. For instance, in mid-2020, the U.S. accused Chinese government hackers of attempting to steal data from COVID-19 vaccine developer Moderna.

Threats of this sort can be more difficult for perennially overwhelmed security teams to prioritize, however, said Sorensen, who is now founder and CEO of cybersecurity vendor SightGain.

"Everybody pays attention to what's right in their face," he said. "Our intellectual property is just flying out of our borders, which is a serious strategic threat. But it's not always the front-burner threat."

That has been particularly the case in 2022 the year of "Shields Up."

Documents leaked by former NSA contractor Edward Snowden appeared to confirm that Chinese government hackers stole data on the U.S.'s F-35 Lightning II. Photo: Robert Atanasovski/AFP via Getty Images

Following the invasion of Ukraine, there was a widespread expectation that the U.S. and other allies of Ukraine would face disruptive cyberattacks by Russia. So far, major retaliatory attacks from Russia have not materialized though experts believe a Russian escalation of this sort could still come as soon as later this year, depending on how events play out with Ukraine and sanctions.

America's focus on its cyber adversaries tends to go in cycles, experts say. And even prior to the Ukraine war, Russian threat actors have been constantly in the spotlight, from the SolarWinds breach by Russia's intelligence forces in 2020 to the Colonial Pipeline and Kaseya ransomware attacks by cybercriminals operating out of the country in 2021.

It's not out of the question that China might pursue similar disruptive cyberattacks against the U.S. and Western Europe in the future, however, if China wants to prevent aid to Taiwan, Daniel said. It's believed that China has been seeking the ability to strike critical infrastructure for a situation such as that, he said.

To date, however, China's cyber activity has been "almost entirely covert cyber espionage campaigns," said Josephine Wolff, associate professor of cybersecurity policy at Tufts University.

Whereas Russian cyberattacks are often meant to create noise and chaos, Wolff said, China's attacks are "meant to happen undercover. They don't want anyone to know it's them."

U.S.-China tensions rose Tuesday as House Speaker Nancy Pelosi visited Taiwan. Mandiant's John Hultquist said in a statement that China is expected to carry out significant cyber espionage against targets in Taiwan and the U.S. related to the situation.

Notably, the Chinese government is very effective at organizing the hacking activities, said SentinelOne's Hegel. "It's a well-oiled machine for mass espionage."

While China's hacking program often does not perform the most technically advanced attacks, its sheer size and persistence allows it to be successful over the longer-term, he said.

But because China's motives are different compared to Russia, "you've got to defend yourself [in] a completely different way," said CTM Insights' Steinberg.

The go-to technologies in these situations are data-loss prevention, data exfiltration detection and deception technologies such as tripwires, he said. Rather than expecting to prevent an intrusion every time, the key to stopping IP theft is "Can you catch it happening and shut it down?"

Businesses should also concentrate on applying special protections to systems that are hosting IP, said Burnard, who is senior consultant for information security research at Secureworks. That might include network segmentation and enhanced monitoring for those parts of the system, he said.

One way that Chinas hackers have been evolving can be seen in their methods for gaining initial access to corporate systems, experts say. Recent years have seen Chinese attackers increasingly exploiting vulnerabilities, instead of just relying on phishing, said Kevin Gonzalez, director of security at cybersecurity vendor Anvilogic.

China-based attackers exploited a dozen published vulnerabilities in 2021, up from just two the prior year, CrowdStrike reported making the Chinese government's hacking operation the "leader in vulnerability exploitation."

The threat actors have shown capabilities for exploiting both previously unknown, zero-day vulnerabilities as well as unpatched known vulnerabilities, Hegel said.

Additionally, Chinas government hackers are now scanning for vulnerabilities the second they pop up online," he said for instance, in the case of Log4Shell, a severe vulnerability in the widely used Apache Log4j software that was uncovered in December 2021. The Chinese government reportedly punished China-based tech giant Alibaba for informing the developers behind Log4j about the flaw prior to telling the government.

China has used more innovative techniques as well, such as software supply chain attacks. The compromises of CCleaner and Asus Live Update in 2017 are among the past instances.

Still, while China's focus on IP theft makes some defenses unique from those needed to stop ransomware, there are plenty of countermeasures that can help against both Russia- and China-style threats, experts said.

Placing an emphasis on strong security hygiene, vulnerability and patch management, identity authentication and zero-trust architecture will go a long way toward defending against attacks regardless of what country they're coming from, said Adam Meyers, senior vice president of intelligence at CrowdStrike.

Threat hunting is also a valuable investment, whether you're concerned about threats from Russia, China or anywhere else, Meyers said. "You have to be out there looking for these threats, because the adversary is constantly moving," he said.

But hacking is not the only cyber threat that China poses to the U.S. and the West, experts say. And it may not even be the most challenging, said Samuel Visner, a longtime cybersecurity executive and former NSA official, who currently serves as technical fellow at MITRE.

The harder question, according to Visner, is how to respond to China's initiative to build a "Digital Silk Road" across much of the globe using exported Chinese IT infrastructure. The technology is believed to be capable of facilitating surveillance on citizens. Ultimately, the fear is that the Digital Silk Road could be used to feed information about Americans or Europeans traveling abroad back to the Chinese government, he said.

While meeting a different definition of cybersecurity, Visner said, "that is also a security challenge."

See the original post here:
Russian hackers get the headlines. But China is the bigger threat to many US enterprises. - Protocol

Why Is July 30th National Whistleblower Day? – Privacy News Online

Whistleblowers play a crucial role in ensuring the rule of law is properly preserved, and the public knows about unlawfully or unethically withheld critical information. .

From the sailors who reported misconduct of a superior officer in the Continental Navy to Bradley Birkenfeld, who helped the government recover billions in taxes, whistleblowers have done a great deal of good. Acknowledging National Whistleblower Appreciation Day on July 30th is a small token of appreciation for these individuals sacrifices.

If you need to blow the whistle on a concerning situation, heres the perfect guide for you. Well cover the risks of whistleblowing and whistleblowing best practices.

A whistleblower is a person who reports certain wrongdoings within their organization. Not all instances of reporting are considered whistleblowing. It all depends on the issue reported.Whistleblowing usually involves highlighting any criminal wrongdoings which affect the health and safety of others, or pose environmental risks. If you report a+ fraud coverup or if you know about a miscarriage of justice and let the relevant authorities know, youre considered a whistleblower.

National Whistleblower Appreciation Day, July 30th, 2022, marks the 244th anniversary of the US passing the first American whistleblower law, which came into effect on July 30th, 1778. In 2013, the US Senate unanimously agreed to honor National Whistleblower Appreciation Day, on July 30th. This day serves as a reminder of whistleblowers important contributions to preserving the laws and democracy of the US.

During the American Revolution, 10 whistleblowers came forward with reports of misconduct committed by a superior officer in the Continental Navy. When the forefathers learned some of them were being prosecuted for their decision to come forward, they took action. They voted to spend money from the governments treasury to pay lawyers to defend the whistleblowers.

These are some of the most iconic whistleblowers in US history who make us proud to support National Whistleblower Appreciation Day, July 30th.

Sherron WatkinsSherron Watkins is a former Enron vice president who exposed the companys improper accounting methods. In 2002, she testified before US Senate and House of Representatives members about the situation. The public criticized her for not coming forward sooner.

Toni SavageDr. Savage was a contracting officer with the Army Corps of Engineers in Alabama. In 2006, Savage reported contract fraud in the Armys Ranges Program. In retaliation, Savage was removed from her position, denied awards, faced hostility, and endured insensitive and racist statements. She was terminated in 2009.

Bradley BirkenfeldBradley Birkenfeld is a former wealth manager and banker at UBS. He was the first international banker to expose US citizens illegal offshore accounts in Switzerland. Birkenfeld was given $104 million as a reward for his whistleblowing which resulted in the recovery of over $25 billion in taxes.

Jane TurnerJane Turner was a special agent for the FBI. In 1999, she reported misconduct regarding the FBIs failure to prosecute crimes against children. She also reported misconduct regarding the potential theft of items from the 9/11 crime scene by FBI personnel. Turner was removed from her position and sexually discriminated against.

Aaron WestrickDr. Westrick was the research director for Second Chance Body Armor. He blew the whistle on defective vests produced and sold to police officers. His actions cost him his job but saved the lives of many police officers.

Edward SnowdenEdward Snowden is a former computer intelligence consultant for the NSA. He developed concerns about the programs he was involved in but was ignored when he raised them internally. He leaked classified NSA information and, as a result, was charged with theft of government property and faced two counts of violating the Espionage Act of 1917.

Cynthia CooperCynthia was the vice president of Internal Audit at Worldcom. Cooper and her team investigated and revealed $3.8 billion worth of fraud at Worldcom in 2002. To recognize her for her discovery and whistleblowing, she was named one of the Times Persons of the Year in 2002.

Mark FeltMark Felt was the FBI associate director involved in the Watergate scandal. He was the anonymous source, codenamed Deep Throat, who leaked critical information about the Watergate scandal leading to President Nixon resigning.

A. Ernest FitzgeraldMr. Fitzgerald was a government employee who blew the whistle on a $2.3 billion cost overrun involving the Lockheed C-5 aircraft. He testified before congress about the issue and saved the government $273 million. Fitzgerald was accused of leaking classified information and fired by President Nixon.

Frederic WhitehurstFrederic Whitehurst was a special agent in the FBI. He investigated and blew the whistle on scientific misconduct and procedural errors he noticed in the lab. In retaliation, the FBI attacked his credibility, criticized his claims, and fired him. After 10 years, the FBI investigated his claims, and 40 major reforms were made.

Even though its for a good cause, blowing the whistle can leave you vulnerable within your organization. Before you raise issues, think about any repercussions and make an action plan on how youll deal with the reaction of your peers and the organizations leadership.

You could be removed from your position or even fired if your identity is revealed after you blow the whistle. Industry players could blacklist you for your role in blowing the whistle on issues within your organization.

Your colleagues may label you as a traitor and treat you as such. You could be bullied and subjected to different types of harassment based on your sex, age, race, religion, and sexuality. Prepare yourself mentally for these scenarios, be strong, remain steadfast, and stick to your values.

Your colleagues may label you as a traitor and treat you as such. You could be bullied and subjected to different types of harassment based on your sex, age, race, religion, and sexuality. Prepare yourself mentally for these scenarios, be strong, remain steadfast, and stick to your values.

You could face lawsuits if your whistleblowing reveals youre involved in any illegal activities.

You could face lawsuits if your whistleblowing reveals youre involved in any illegal activities.

Is your goal to preserve the integrity of your organization, or do you wish to see it dismantled? The way you report information and who you report it to can determine if the issue is quietly dealt with internally or is dealt with in the courts.

Whistleblowing isnt just about exposing information you may consider to be juicy gossip. You will be reporting offenses that are potentially criminal, so you should consider the process and repercussions. You should find out if it will affect your career, how your actions could affect your family and friends, and how your family and friends will treat you.

You need to carefully identify people who wont betray you during the process. When you solicit the help of coworkers or external individuals who dont have the same moral compass or have more to gain from exposing your plans, they can derail you. If you can uncover and report the unlawful or unethical situation on your own, you should do so. Its even better if you can complete the process while staying anonymous.

If your identity is discovered illegally, you may not face prosecution, but that doesnt mean youre completely safe. Your organization can still retaliate against you, by firing or harassing you. Some entities will try to invade your privacy so they can collect data to attack your credibility. Use PIA VPN to scramble your data in transit and install our antivirus to protect your devices from breaches.

In some situations, its best to report unethical or egregious procedures through internal channels. When you have a certain level of confidence that your leadership team can adequately address the situation, you should start there. Remember, if you expose issues internally, your identity is known, so if you go public with your report afterwards you cant do it anonymously.

Sometimes, the best solution is to raise issues publicly first, eg. when the perpetrators are high-ranking individuals. When you do this, resolutions are usually faster, which means reduced opportunities for coverups.

To keep yourself protected when you blow the whistle, follow these best practices:

Find a knowledgeable lawyer who can guide you through the process.

Develop a plan and dont do things on a whim.

Figure out how to stay anonymous while you collect and reveal evidence. You can use a VPN to conceal your internet activity, but remember, encrypted traffic can draw attention to you. Use a VPN like Private Internet Access with a multi-hop feature that obfuscates your traffic to hide your VPN use.

Dont interview co-workers and make it obvious to everyone youre asking questions. Try to be discrete and engage inconversations about the topic when it feels natural. Dont rush your evidence-gathering process; only gather as much information as needed.

Meet with informants away from your organization. This makes it harder to identify you as the whistleblower. Its even better if you can use proxies to do meetups for you, allowing you to stay anonymous.

The US has multiple whistleblowing laws such as the False Claims Act which allows whistleblowers to sue those who defraud the government on its behalf. Additionally, Federal government employees are protected under The Whistleblower Protection Act with some exceptions including those who work for the FBI.

Members of the intelligence community are protected under the Intelligence Community Whistleblower Protection Act of 1998 and the FBI Whistleblower Protection Enhancement Act of 2016.

Whistleblowing is risky but necessary. Its important for someone to take on the responsibility to maintain the integrity of organizations and government agencies if the need arises.

If you find yourself in a situation where you need to report criminal or fraudulent activities, you should plan how you will execute the process. Follow our best practices for whistleblowing to remain anonymous and safe from retaliation. Try to anticipate possible reactions if your identity is revealed and prepare for them.

July 30th marks the anniversary of the US passing the first American whistleblower law on July 30th, 1778. This day is a reminder of the important contributions multiple whistleblowers have made to preserving and improving US laws.

In 2013, the US Senate unanimously agreed to honor July 30th as National Whistleblower Appreciation Day. It encourages others to blow the whistle on egregious situations and also reminds them about the dangers of blowing the whistle without protecting their anonymity.

July 30th is National Whistleblower Appreciation Day. Its also the day In God we trust became the USs national motto on July 30th, 1956. Uruguay defeated Argentina on this day in 1930 to win the first ever football World Cup. The Republic of Vanuatu also celebrates its independence on this day.

Becoming a whistleblower has many risks. You may lose your job, experience harassment, become a victim of doxxing, have your credibility attacked, and other organizations could blacklist you. If you reveal you were involved in any illegal activities, you could also end up in prison. Secure your online traffic and mitigate some of these risks.

Go here to read the rest:
Why Is July 30th National Whistleblower Day? - Privacy News Online

I may have to wait until I’m on my deathbed Panama Papers whistleblower – Namibian

I MAY HAVE to wait until I'm on my deathbed.

These were the words of the anonymous whistleblower who leaked a trove of documents, known as the Panama Papers, which implicated Namibians and international names in dubious activities six years ago.

The Panama Papers, which The Namibian and more than 400 journalists combed through, included 11,5 million leaked documents that showed how the rich create offshore shell companies in tax havens to avoid paying taxes, to conceal their riches, and to engage in crimes such as money laundering.

The Namibian's investigative unit has produced several investigative articles since 2016 as part of the global reporting on the Panama Papers.

Leaked documents showed that Namibia's financial system was contaminated with mafioso money through Vito Palazzolo, who was once viewed as one of the most powerful figures in the Italian mafia, the Cosa Nostra.

Known only as John Doe, the whistleblower has never disclosed their identity or their gender.

They said they were motivated to speak out by a growing sense of 'instability' in the world, and from disappointment that more hasn't been done to clamp down on a secretive financial system that props up autocrats and enables people like Russian president Vladimir Putin to launch a war in Ukraine.

It's a risk that I live with, given that the Russian government has expressed the fact that it wants me dead, they said in an interview with Germany's Der Spiegel.Doe, who only spoke out publicly once before, recently reached out to the two German journalists who had received the leaked documents in 2015 concerning the Panamanian law firm Mossack Fonseca.

The two reporters from Suddeutsche Zeitung, Frederik Obermaier and Bastian Obermayer, now work for Der Spiegel.

They agreed to share the transcript of their Doe interview with media groups (including The Namibian) that participated in the award-winning investigation under the umbrella of the International Consortium of Investigative Journalists (ICIJ).

Below is the verbatim interview, which was published in Der Spiegel.

Der Spiegel (DS): How are you doing? Are you safe? John Doe (JD): I am safe, to the best of my knowledge. We live in a perilous world, and that weighs on me sometimes. But overall I am doing quite well, and I consider myself very fortunate.

DS: You stayed silent for six years.

Haven't you been tempted to reveal that it was you who made the secret offshore dealings of heads of state and heads of governments, drug cartels, and criminals public? JD: I have often wrestled, as I think many people do, with issues of being credited for my work. Fame was never part of the equation. At that stage, the only concern was staying alive long enough for someone to tell the story.

Making the decision to compile the data available to me at Mossack Fonseca took days and felt like looking down the barrel of a loaded gun, but ultimately, I had to do it.

DS: You reached out to the German daily Sddeutsche Zeitung, which initiated a collaboration of more than 400 journalists, coordinated by the ICIJ. When you reached out to us, what did you have in mind? JD: When I contacted you, I had absolutely no idea what would happen or if you would even respond. I corresponded with many journalists who were uninterested, including at The New York Times and The Wall Street Journal.

WikiLeaks, for its part, did not even bother answering when I reached out to them later on. (Editor's note: The New York Times and The Wall Street Journal did not want to comment, and WikiLeaks did not respond to a request for comment.) DS: How satisfied are you with the impact of the leak? JD: I am astounded with the outcome of the Panama Papers.

What the ICIJ accomplished was unprecedented, and I am extremely pleased, and even proud, that major reforms have taken place as a result of the Panama Papers.

The fact that there have been subsequent journalistic collaborations of similar scale is also a real triumph.

Sadly, it is still not enough.

I never thought that releasing one law firm's data would solve global corruption full stop, let alone change human nature.

Politicians must act.

We need publicly accessible corporate registries in every jurisdiction, from the British Virgin Islands to Anguilla to the Seychelles to Labuan to Delaware.

Now.

And if you hear resistance, that sound you hear is the sound of a politician who must be sacked.

DS: Since 2016, thousands of Panama Papers stories have been published. Are there any you think the world still needs to see? JD: There are so many untold stories. One that comes to mind is a trust with yellow paper checks that was likely set up for a drug cartel by a Colombian consulting firm, in which a large American bank appears to have allowed direct use of its correspondent bank account with a bank in Panama.

Payees' names were typed on these checks with a typewriter. To call this arrangement unusual would be an understatement they might as well have issued checks made out of actual red flags.

DS: Edward Snowden once mentioned your case as being the best-case scenario for a whistleblower: You created a big impact and are still unknown and free. Is that also how you see your role? JD: I count myself as incredibly lucky that everything has worked out as well as it has, even if nothing is perfect. Remaining unknown has had the obvious benefit of keeping me relatively safe, but there has been a cost as well, which is that I have not been able to keep the issue in the public eye the way that Edward Snowden did regarding the National Security Agency (NSA) wiretapping revelations.

Of course, he paid with his freedom to some degree. There are always trade-offs.

DS: What has your leak taught you about whistleblowing? JD: I would say the most important thing is that my example shows it is possible, although perhaps rare, to make a major difference and still maintain a good life. But it takes a lot of work and a lot of luck to stay one step ahead.

DS: Is there anything you would recommend to potential whistleblowers? JD: Telling the truth about sensitive matters is never easy. I would say that an underappreciated factor is just how difficult it is to keep a level head.

Whether you are talking to journalists or government authorities, be prepared for everything to move very slowly.

It's important to just breathe and find other things to think about from time to time.

DS: If you could turn back time, would you blow the whistle again? JD: In a heartbeat.

*Not his real name.

Frederik Obermaier and Bastian Obermayer run Paper Trail Media, a German-based investigative platform.

Visit https://www.papertrailmedia.de/ for more.

Originally posted here:
I may have to wait until I'm on my deathbed Panama Papers whistleblower - Namibian

Julian Assange? Heres why I am not a fan of his – The Citizen

By Charles Makakala

On July 12, 2007, two US Apache helicopters attacked multiple sites in Baghdad during the insurgency that followed the American invasion of Iraq. The world hardly noticed until a leaked video in 2010 revealed what actually happened on that day.

In the footage, American soldiers are seen firing at a group of about 20 people, and later a van and a building, killing seven men and wounding others. They were all civilians and those killed included two journalists. Two of the three children in the van were wounded. Upon observing that, one soldier commented, Well, its their fault for bringing their kids into the battle.

The video was leaked by Private Bradley Manning, an intelligence officer with the US Army. For weeks, Manning had been conversing anonymously with an individual at WikiLeaks using an encrypted channel. At the other end was Julian Assange, an Australian computer programmer who had founded WikiLeaks. The decisions they made in 2010 transformed their lives Manning ending up in jail, and Assange spending the past decade fighting extradition to US.

For many people, Manning and Assange are considered activists and human rights heroes for their actions. The revelations of events such as the one above, plus many other American misdeeds, are used to substantiate that position. As a result, the duo have received countless awards for their standing and courage.

However, on June 17, 2022, a UK government minister signed an order to deport Assange to the US, the decision that would have brought to an end a decade-long legal saga about Assange. Assange appealed against the decision, and the world once again rose up in his support. The President of Mexico called for his release. In Germany, more than 70 MPs did the same. Amnesty International and other organisations have made similar calls.

It was, therefore, predictable to see many Africans adding their voices to the Free Assange chorus. Petitions have been signed and mobilisation is done through social media to put pressure on the UK and US governments to let Assange go. Africans are very tribal, especially if the matter at issue is against the US.

With every post by an acquaintance or a friend here or there announcing that they have signed such petitions and rallying others to do the same thing, I am reminded of how radically different my views are to theirs. From the very beginning, I have always considered Manning, Assange, and later Edward Snowden traitors who deserve to face justice.

On June 9, 2013, a video by Snowden appeared on the internet detailing how the US intelligence agency NSA, was spying on its citizens. Not surprisingly, the video catapulted Snowden into global stardom as a champion of citizens rights in an increasingly connected digital world. From Russia, where Snowden took refuge, he justified his actions as (informing) the public as to that which is done in their name and that which is done against them.

Manning and Assange have used similar arguments to defend themselves, but it doesnt add up.

A person who is motivated by ethical consideration is judicious. They will understand the gravity of their actions, and will be extremely careful in their approach. Considering the mercenary ways in which the documents released by Snowden and Manning were obtained, that is espionage. Moreover, considering the reckless manner in which thousands of secret documents are shared in the internet, without any regard for the implications, that is traitorous. Manning, for example, concealed the documents in a Lady Gaga CD case so as to pass through security and later sent more than 700,000 confidential documents to WikiLeaks including over 250,000 diplomatic cables going back to 1966.

That is anarchy.

Unfortunately, this is not a new phenomenon.

In 1986, Mordechai Vanunu, an Israeli nuclear technician, disclosed details of Israels nuclear programme to the British media, expecting to be paid $1 million in return. Vanunu illegally smuggled a camera into the Negev Nuclear Research Facility and took photographs of the facility and shared them with the British press. The Mossad, Israels intelligence agency, lured Vanunu out of the UK through a classic honey-trap method, capturing him and subsequently sending him to Israel where he spent 18 years in prison.

Like others of his ilk, Vanunu justified his actions on account of his ethical consideration, in his case, his opposition to nuclear weapons. There is nothing wrong in principle with that ethical position, but if one is opposed to nuclear weapons, why would they pick a job developing nuclear weapons?

The business of the state requires a certain degree of secrecy and confidentiality. Diplomats have to report openly, security officers use clandestine means to gather intelligence, and leaders make tough decisions to stop wickedness. Yes, these privileges are often abused, but the need for increased accountability is not enough justification for anarchy.

We live in the world where people have become increasingly vain. Traditional values of loyalty and integrity are considered secondary to fame and pseudo-heroism. How can anyone confuse whistleblowing with dumping of millions of confidential documents on the internet? Moreover, how can anyone expect to do that and face no consequences? Finally, is Putins Russia, arguably your nations biggest security threat, the place that you would take refuge in?

Truly, as it is said, fools rush in where angels fear to tread.

Go here to read the rest:
Julian Assange? Heres why I am not a fan of his - The Citizen

Whatever Happened to the Transhumanists? – Gizmodo Australia

Gizmodo is 20 years old! In the summer of 2002, The Gadgets Weblog officially launched to cover all of your gadget weblogging needs. The last two decades have been a wild ride in technology, so were taking this opportunity to look back at some of the most significant ways our lives have been thrown for a loop by our digital tools. Weve come a long way since the days of TiVo, Napster, and Palm Pilots. Unfortunately, were still not old enough to drink.

Like so many others after 9/11, I felt spiritually and existentially lost. Its hard to believe now, but I was a regular churchgoer at the time. Watching those planes smash into the World Trade Centre woke me from my extended cerebral slumber and I havent set foot in a church since, aside from the occasional wedding or baptism.

I didnt realise it at the time, but that godawful day triggered an intrapersonal renaissance in which my passion for science and philosophy was resuscitated. My marriage didnt survive this mental reboot and return to form, but it did lead me to some very positive places, resulting in my adoption of secular Buddhism, meditation, and a decade-long stint with vegetarianism. It also led me to futurism, and in particular a brand of futurism known as transhumanism.

Transhumanism made a lot of sense to me, as it seemed to represent the logical next step in our evolution, albeit an evolution guided by humans and not Darwinian selection. As a cultural and intellectual movement, transhumanism seeks to improve the human condition by developing, promoting, and disseminating technologies that significantly augment our cognitive, physical, and psychological capabilities. When I first stumbled upon the movement, the technological enablers of transhumanism were starting to come into focus: genomics, cybernetics, artificial intelligence, and nanotechnology. These tools carried the potential to radically transform our species, leading to humans with augmented intelligence and memory, unlimited lifespans, and entirely new physical and cognitive capabilities. And as a nascent Buddhist, it meant a lot to me that transhumanism held the potential to alleviate a considerable amount of suffering through the elimination of disease, infirmary, mental disorders, and the ravages of ageing.

The idea that humans would transition to a posthuman state seemed both inevitable and desirable, but, having an apparently functional brain, I immediately recognised the potential for tremendous harm. Wanting to avoid a Brave New World dystopia (perhaps vaingloriously), I decided to get directly involved in the transhumanist movement in hopes of steering it in the right direction. To that end, I launched my blog, Sentient Developments, joined the World Transhumanist Association (now Humanity+), co-founded the now-defunct Toronto Transhumanist Association, and served as the deputy editor of the transhumanist e-zine Betterhumans, also defunct. I also participated in the founding of the Institute for Ethics and Emerging Technologies (IEET), on which I continue to serve as chairman of the board.

Indeed, it was also around this time in the early- to mid-2000s that I developed a passion for bioethics. This newfound fascination, along with my interest in futurist studies and outreach, gave rise to a dizzying number of opportunities. I gave talks at academic conferences, appeared regularly on radio and television, participated in public debates, and organised transhumanist-themed conferences, including TransVision 2004, which featured talks by Australian performance artist Stelarc, Canadian inventor and cyborg Steve Mann, and anti-ageing expert Aubrey de Grey.

The transhumanist movement had permeated nearly every aspect of my life, and I thought of little else. It also introduced me to an intriguing (and at times problematic) cast of characters, many of whom remain my colleagues and friends. The movement gathered steady momentum into the late 2000s and early 2010s, acquiring many new supporters and a healthy dose of detractors. Transhumanist memes, such as mind uploading, genetically modified babies, human cloning, and radical life extension, flirted with the mainstream. At least for a while.

The term transhumanism popped into existence during the 20th century, but the idea has been around for a lot longer than that.

The quest for immortality has always been a part of our history, and it probably always will be. The Mesopotamian Epic of Gilgamesh is the earliest written example, while the Fountain of Youth the literal Fountain of Youth was the obsession of Spanish explorer Juan Ponce de Len.

Notions that humans could somehow be modified or enhanced appeared during the European Enlightenment of the 18th century, with French philosopher Denis Diderot arguing that humans might someday redesign themselves into a multitude of types whose future and final organic structure its impossible to predict, as he wrote in DAlemberts Dream. Diderot also thought it possible to revive the dead and imbue animals and machines with intelligence. Another French philosopher, Marquis de Condorcet, thought along similar lines, contemplating utopian societies, human perfectibility, and life extension.

The Russian cosmists of the late 19th and early 20th centuries foreshadowed modern transhumanism, as they ruminated on space travel, physical rejuvenation, immortality, and the possibility of bringing the dead back to life, the latter being a portend to cryonics a staple of modern transhumanist thinking. From the 1920s through to the 1950s, thinkers such as British biologist J. B. S. Haldane, Irish scientist J. D. Bernal, and British biologist Julian Huxley (who popularised the term transhumanism in a 1957 essay) were openly advocating for such things as artificial wombs, human clones, cybernetic implants, biological enhancements, and space exploration.

It wasnt until the 1990s, however, that a cohesive transhumanist movement emerged, a development largely brought about by you guessed it the internet.

As with many small subcultures, the internet allowed transhumanists around the world to start communicating on email lists, and then websites and blogs, James Hughes, a bioethicist, sociologist, and the executive director of the IEET, told me. Almost all transhumanist culture takes place online. The 1990s and early 2000s were also relatively prosperous, at least for the Western countries where transhumanism grew, so the techno-optimism of transhumanism seemed more plausible.

The internet most certainly gave rise to the vibrant transhumanist subculture, but the emergence of tantalising, impactful scientific and technological concepts is what gave the movement its substance. Dolly the sheep, the worlds first cloned animal, was born in 1996, and in the following year Garry Kasparov became the first chess grandmaster to lose to a supercomputer. The Human Genome Project finally released a complete human genome sequence in 2003, in a project that took 13 years to complete. The internet itself gave birth to a host of futuristic concepts, including online virtual worlds and the prospect of uploading ones consciousness into a computer, but it also suggested a possible substrate for the Nosphere a kind of global mind envisioned by the French Jesuit philosopher Pierre Teilhard de Chardin.

Key cheerleaders contributed to the proliferation of far-flung futurist-minded ideas. Eric Drexlers seminal book Engines of Creation (1986) demonstrated the startling potential for (and peril of) molecular nanotechnology, while the work of Hans Moravec and Kevin Warwick did the same for robotics and cybernetics, respectively. Futurist Ray Kurzweil, through his law of accelerating returns and fetishization of Moores Law, convinced many that a radical future was at hand; in his popular books, The Age of Spiritual Machines (1999) and The Singularity is Near (2005), Kurzweil predicted that human intelligence was on the cusp of merging with its technology. In his telling, this meant that we could expect a Technological Singularity (the emergence of greater-than-human artificial intelligence) by the mid-point of the 21st century (as an idea, the Singularity another transhumanist staple has been around since the 1960s and was formalized in a 1993 essay by futurist and sci-fi author Vernor Vinge). In 2006, an NSF-funded report, titled Managing Nano-Bio-Info-Cogno Innovations: Converging Technologies in Society, showed that the U.S. government was starting to pay attention to transhumanist ideas.

A vibrant grassroots transhumanist movement developed at the turn of the millennium. The Extropy Institute, founded by futurist Max More, and the World Transhumanist Association (WTA), along with its international charter groups, gave structure to what was, and still is, a wildly divergent set of ideas. A number of specialty groups with related interests also emerged, including: the Methuselah Foundation, the Singularity Institute for Artificial Intelligence (now the Machine Intelligence Research Institute), the Centre for Responsible Nanotechnology, the Foresight Institute, the Lifeboat Foundation, and many others. Interest in cryonics increased as well, with the Alcor Life Extension Foundation and the Cryonics Institute receiving more attention than usual.

Society and culture got cyberpunked in a hurry, which naturally led people to think increasingly about the future. And with the Apollo era firmly in the rear view mirror, the publics interest in space exploration waned. Bored of the space-centric 2001: A Space Odyssey and Star Wars, we increasingly turned our attention to movies about AI, cybernetics, and supercomputers, including Blade Runner, Akira, and The Matrix, many of which had a distinctive dystopian tinge.

With the transhumanist movement in full flight, the howls of outrage became louder from critics within the conservative religious right through to those on the anti-technological left. Political scientist Francis Fukuyama declared transhumanism to be the worlds most dangerous idea, while bioethicist Leon Kass, a vocal critic of transhumanism, headed-up President George W. Bushs bioethics council, which explicitly addressed medical interventions meant to enhance human capabilities and appearance. The bioethical battle lines of the 21st century, it appeared, were being drawn before our eyes.

It was a golden era for transhumanism. Within a seemingly impossible short time, our ideas went from obscurity to tickling the zeitgeist. The moment that really did it for me was seeing the cover of TIMEs February 21, 2011, issue, featuring the headline, 2045: The Year Man Becomes Immortal, and cover art depicting a brain-jacked human head.

By 2012, my own efforts in this area had landed me a job as a contributing editor for Gizmodo, which served to expand my interest in science, futurism, and philosophy even further. I presented a talk at Moogfest in 2014 and had some futurist side hustles, serving as the advisor for National Geographics 2017 documentary-drama series, Year Million. Transhumanist themes permeated much of my work back then, whether at Gizmodo or later with Gizmodo, but less so with each passing year. These days I barely write about transhumanism, and my involvement in the movement barely registers. My focus has been on spaceflight and the ongoing commercialization of space, which continues to scratch my futurist itch.

What was once a piercing roar has retreated to barely discernible background noise. Or at least thats how it currently appears to me. For reasons that are both obvious and not obvious, explicit discussions of transhumanism and transhumanists have fallen by the wayside.

The reason we dont talk about transhumanism as much as we used to is that much of it has become a bit normal at least as far as the technology goes, as Anders Sandberg, a senior research fellow from the Future of Humanity Institute at the University of Oxford, told me.

We live lives online using wearable devices (smartphones), aided by AI and intelligence augmentation, virtual reality is back again, gene therapy and RNA vaccines are a thing, massive satellite constellations are happening, drones are becoming important in warfare, trans[gender] rights are a big issue, and so on, he said, adding: We are living in a partially transhuman world. At the same time, however, the transhumanist idea to deliberately embrace the change and try to aim for such a future has not become mainstream, Sandberg said.

His point about transhumanism having a connection to trans-rights may come as a surprise, but the futurist linkage to LGBTQ+ issues goes far back, whether it be sci-fi novelist Octavia Butler envisioning queer families and greater gender fluidity or feminist Donna Haraway yearning to be a cyborg rather than a goddess. Transhumanists have long advocated for a broadening of sexual and gender diversity, along with the associated rights to bodily autonomy and the means to invoke that autonomy. In 2011, Martine Rothblatt, the billionaire transhumanist and transgender rights advocate, took it a step further when she said, we cannot be surprised that transhumanism arises from the groins of transgenderism, and that we must welcome this further transcendence of arbitrary biology.

Natasha Vita-More, executive director of Humanity+ and an active transhumanist since the early 1980s, says ideas that were foreign to non-transhumanists 20 years ago have been integrated into our regular vocabulary. These days, transhumanist-minded thinkers often reference concepts such as cryonics, mind uploading, and memory transfer, but without having to invoke transhumanism, she said.

Is it good that we dont reference transhumanism as much anymore? No, I dont think so, but I also think it is part of the growth and evolution of social understanding in that we dont need to focus on philosophy or movements over technological or scientific advances that are changing the world, Vita-More told me. Moreover, people today are far more knowledgeable about technology than they were 20 years ago and are more adept at considering the pros and cons of change rather than just the cons or potential bad effects, she added.

PJ Manney, futurist consultant and author of the transhumanist-themed sci-fi Phoenix Horizon trilogy, says all the positive and optimistic visions of future humanity are being tempered or outright dashed as we see humans taking new tools and doing what humans do: the good, the bad, and the ugly.

Indeed, were a lot more cynical and wary of technology than we were 20 years ago, and for good reasons. The Cambridge Analytica data scandal, Edward Snowdens revelations about government spying, and the emergence of racist policing software were among an alarming batch of reproachable developments that demonstrated technologys potential to turn sour.

We dont talk about transhumanism that much any more because so much of it is in the culture already, Manney, who serves with me on the IEET board of directors, continued, but we exist in profound future shock and with cultural and social stresses all around us. Manney referenced the retrograde SCOTUS reversals and how U.S. states are removing human rights from acknowledged humans. She suggests that we secure human rights for humans before we consider our silicon simulacrums.

Nigel Cameron, an outspoken critic of transhumanism, said the futurist movement lost much of its appeal because the naive framing of the enormous changes and advances under discussion got less interesting as the distinct challenges of privacy, automation, and genetic manipulation (e.g. CRISPR) began to emerge. In the early 2000s, Cameron led a project on the ethics of emerging technologies at the Illinois Institute of Technology and is now a Senior Fellow at the University of Ottawas Institute on Science, Society and Policy.

Sandberg, a longstanding transhumanist organiser and scholar, said the War on Terror and other emerging conflicts of the 2000s caused people to turn to here-and-now geopolitics, while climate change, the rise of China, and the 2008 financial crisis led to the pessimism seen during the 2010s. Today we are having a serious problem with cynicism and pessimism paralyzing people from trying to fix and build things, Sandberg said. We need optimism!

Some of the transhumanist groups that emerged in the 1990s and 2000s still exist or evolved into new forms, and while a strong pro-transhumanist subculture remains, the larger public seems detached and largely disinterested. But thats not to say that these groups, or the transhumanist movement in general, didnt have an impact.

The various transhumanist movements led to many interesting conversations, including some bringing together conservatives and progressives into a common critique, said Cameron.

I think the movements had mainly an impact as intellectual salons where blue-sky discussions made people find important issues they later dug into professionally, said Sandberg. He pointed to Oxford University philosopher and transhumanist Nick Bostrom, who discovered the importance of existential risk for thinking about the long-term future, which resulted in an entirely new research direction. The Centre for the Study of Existential Risk at the University of Cambridge and the Future of Humanity Institute at Oxford are the direct results of Bostroms work. Sandberg also cited artificial intelligence theorist Eliezer Yudkowsky, who refined thinking about AI that led to the AI safety community forming, and also the transhumanist cryptoanarchists who did the groundwork for the cryptocurrency world, he added. Indeed, Vitalik Buterin, a co-founder of Ethereum, subscribes to transhumanist thinking, and his father, Dmitry, used to attend our meetings at the Toronto Transhumanist Association.

According to Manney, various transhumanist-driven efforts inspired a vocabulary and creative impulse for many, including myself, to wrestle with the philosophical, technological and artistic implications that naturally arise. Sci-fi grapples with transhumanism now more than ever, whether people realise it or not, she said. Fair point. Shows like Humans, Orphan Black, Westworld, Black Mirror, and Upload are jam-packed with transhumanist themes and issues, though the term itself is rarely if ever uttered. That said, these shows are mostly dystopian in nature, which suggests transhumanism is mostly seen through grey-coloured glasses. To be fair, super-uplifting portrayals of the future rarely work as Hollywood blockbusters or hit TV shows, but its worth pointing out that San Junipero is rated as among the best Black Mirror episodes for its positive portrayal of uploading as a means to escape death.

For the most part, however, transhuman-flavored technologies are understandably scary and relatively easy to cast in a negative light. Uncritical and starry-eyed transhumanists, of which there are many, werent of much help. Manney contends that transhumanism itself could use an upgrade. The lack of consideration for consequences and follow-on effects, as well as the narcissistic demands common to transhumanism, have always been the downfall of the movement, she told me. Be careful what you wish for you may get it. Drone warfare, surveillance societies, deepfakes, and the potential for hackable bioprostheses and brain chips have made transhumanist ideas less interesting, according to Manney.

Like so many other marginal social movements, transhumanism has had an indirect influence by widening the Overton window [also known as the window of discourse] in policy and academic debates about human enhancement, Hughes explained. In the 2020s, transhumanism still has its critics, but it is better recognised as a legitimate intellectual position, providing some cover for more moderate bioliberals to argue for liberalized enhancement policies.

Sandberg brought up a very good point: Nothing gets older faster than future visions. Indeed, many transhumanist ideas from the 1990s now look quaint, he said, pointing to wearable computers, smart drinks, imminent life extension, and all that internet utopianism. That said, Sandberg thinks the fundamental vision of transhumanism remains intact, saying the human condition can be questioned and changed, and we are getting better at it. These days, we talk more about CRISPR (a gene-editing tool that came into existence in 2012) than we do nanotechnology, but transhumanism naturally upgrades itself as new possibilities and arguments show up, he said.

Vita-More says the transhumanist vision is still desirable and probably even more so because it has started to make sense for many. Augmented humans are everywhere, she said, from implants, smart devices that we use daily, human integration with computational systems that we use daily, to the hope that one day we will be able to slow down memory loss and store or back-up our neurological function in case of memory loss or diseases of dementia and Alzheimers.

The observation that transhumanism has started to make sense for many is a good one. Take Neuralink, for example. SpaceX CEO Elon Musk based the startup on two very transhumanistic principles that interfaces between the brain and computers are possible and that artificial superintelligence is coming. Musk, in his typical fashion, claims a philanthropic motive for wanting to build neural interface devices, as he believes boosted brains will protect us from malign machine intelligence (I personally think hes wrong, but thats another story).

For Cameron, transhumanism looks as frightening as ever, and he honed in on a notion he refers to as the hollowing out of the human, the idea that all that matters in Homo sapiens can be uploaded as a paradigm for our desiderata. In the past, Cameron has argued that if machine intelligence is the model for human excellence and gets to enhance and take over, then we face a new feudalism, as control of finance and the power that goes with it will be at the core of technological human enhancement, and democracywill be dead in the water.

That being said, and despite these concerns, Manny believes theres still a need for a transhumanist movement, but one that addresses complexity and change for all humanity.

Likewise, Vita-More says a transhumanist movement is still needed because it serves to facilitate change and support choices based on personal needs that look beyond binary thinking, while also supporting diversity for good.

There is always a need for think tanks. While there are numerous futurist groups that contemplate the future, they are largely focused on energy, green energy, risks, and ethics, said Vita-More. Few of these groups are a reliable source of knowledge or information about the future of humanity other than a postmodernist stance, which is more focused on feminist studies, diversity, and cultural problems. Vita-More currently serves as the executive director of Humanity+.

Hughes says that transhumanists fell into a number of political, technological, and even religious camps when they tried to define what they actually wanted. The IEET describes its brand of transhumanism as technoprogressivism an attempt to define and promote a social democratic vision of an enhanced future, as Hughes defines it. As a concept, technoprogressivism provides a more tangible foundation for organising than transhumanism, says Hughes, so I think we are well beyond the possibility of a transhumanist movement and will now see the growth of a family of transhumanist-inspired or influenced movements that have more specific identities, including Mormon and other religious transhumanists, libertarians and technoprogressives, and the ongoing longevist, AI, and brain-machine subcultures.

I do think we need public intellectuals to be more serious about connecting the dots, as technologies continue to converge and offer bane and blessing to the human condition, and as our response tends to be uncritically enthusiastic or perhaps unenthusiastic, said Cameron.

Sandberg says transhumanism is needed as a counterpoint to the pervasive pessimism and cynicism of our culture, and that to want to save the future you need to both think it is going to be awesome enough to be worth saving, and that we have power to do something constructive. To which he added: Transhumanism also adds diversity the future does not have to be like the present.

As Manney aptly pointed out, it seems ludicrous to advocate for human enhancement at a time when abortion rights in the U.S. have been rescinded. The rise of anti-vaxxers during the covid-19 epidemic presents yet another complication, showing the extent to which the public willingly rejects a good thing. For me personally, the anti-vaxxer response to the pandemic was exceptionally discouraging, as I often reference vaccines to explain the transhumanist mindset that we already embrace interventions that enhance our limited genetic endowments.

Given the current landscape, its my own opinion that self-described transhumanists should advocate and agitate for full bodily, cognitive, and reproductive autonomy, while also championing the merits of scientific discourse. Until these rights are established, it seems a bit premature to laud the benefits of improved memories or radically extended lifespans, as sad as it is to have to admit that.

These contemporary social issues aside, the transhuman future wont wait for us to play catchup. These technologies will arrive, whether they emerge from university labs or corporate workshops. Many of these interventions will be of great benefit to humanity, but others could lead us down some seriously dark paths. Consequently, we must move the conversation forward.

Which reminds me of why I got involved in transhumanism in the first place my desire to see the safe, sane, and accessible implementation of these transformative technologies. These goals remain worthwhile, regardless of any explicit mention of transhumanism. Thankfully, these conversations are happening, and we can thank the transhumanists for being the instigators, whether you subscribe to our ideas or not.

From the Gizmodo archives:

An Irreverent Guide to Transhumanism and The Singularity

U.S. Spy Agency Predicts a Very Transhuman Future by 2030

Most Americans Fear a Future of Designer Babies and Brain Chips

Transhumanist Tech Is a Boner Pill That Sets Up a Firewall Against Billy Joel

DARPAs New Biotech Division Wants to Create a Transhuman Future

See more here:
Whatever Happened to the Transhumanists? - Gizmodo Australia