Global E-mail Encryption Market Dynamics Analysis, Production, Supply and Demand, Covered in the Latest Research 2021-2026 – Digital Journal

Global E-mail Encryption Market 2021 by Company, Regions, Type and Application, Forecast to 2026 added by MarketsandResearch.biz offers research-based global study and analysis of the market. The report contains reliable market information based on current and future market conditions. The report displays a far-reaching consistent survey of the present situation of the market and, with the assistance of present information, and gives a forward-looking view of the way in which the global E-mail Encryption market will grow in a couple of years from 2021 to 2026.

The report provides an overview of all the leading players in the market, taking into account key factors such as performance, production, and portfolio product. This report provides an in-depth overview of the drivers and limitations available in the market. The research illuminates strategic production, revenue, and consumption trends for players to increase sales and growth in the global E-mail Encryption market.

DOWNLOAD FREE SAMPLE REPORT: https://www.marketsandresearch.biz/sample-request/202945

Top leading companies of market are:

The report also focuses on the latest developments, sales, market value, gross margin, and other important business factors of major players operating in the global E-mail Encryption market. Detailed market segmentation by product/application and by region is given. In addition, global and regional supply chain insight offers crucial information about retail suppliers, distributors, and key end-users. The study also outlines import-export scenarios, influencing forces, and other factors in order to completely and thoroughly explain market conditions.

On the basis of types, the global market is primarily split into:

On the basis of applications, the global covers:

The regional and country-level analysis covers:

ACCESS FULL REPORT: https://www.marketsandresearch.biz/report/202945/global-e-mail-encryption-market-2021-by-company-regions-type-and-application-forecast-to-2026

Crucial information on global E-mail Encryption market size, geographical presence, objectives, the market scope is included. Exhaustive information about new products, untapped geographies, recent developments, and investments in the market is given in the report. It also identifies significant trends, drivers, influence factors in global and regions. The report further recognizes noteworthy patterns and factors driving or representing the market development.

Customization of the Report:

This report can be customized to meet the clients requirements. Please connect with our sales team ([emailprotected]), who will ensure that you get a report that suits your needs. You can also get in touch with our executives on +1-201-465-4211 to share your research requirements.

Contact UsMark StoneHead of Business DevelopmentPhone: +1-201-465-4211Email: [emailprotected]Web: http://www.marketsandresearch.biz

See the original post:
Global E-mail Encryption Market Dynamics Analysis, Production, Supply and Demand, Covered in the Latest Research 2021-2026 - Digital Journal

ransomeware threat.files are encrypted with .moqs extension – Ransomware Help & Tech Support – BleepingComputer

You are dealing with a newer variant ofSTOP (Djvu) Ransomwareas explainedherebyAmigo-A(Andrew Ivanov). Since switching to the new STOP Djvu variants (and the release of .gero) the malware developers have been consistent on using4-letter extensions.

The.djvu* and newer variants will leave ransom notes named_openme.txt,_open_.txtor_readme.txt

Please read thefirst page(Post #1) of theSTOP Ransomware (.STOP, .Puma, .Djvu, .Promo, .Drume) Support TopicAND theseFAQsfor asummary of this infection, it's variants,any updatesandpossible decryption solutionsusing theEmsisoft Decryptor.

In regards tonew variants of STOP (Djvu) Ransomware...decryption of data requires anOFFLINE IDwith corresponding private key. There no longer is an easy method to get a private key for many of these newer variants andno way to decrypt files if infected with an ONLINE KEY without paying the ransom(which is not recommended)and obtaining the private keys from the criminals who created the ransomware. Emsisoft can only get a private key for OFFLINE IDs AFTER a victim has PAID the ransom, receives a key and provides it to them.

If infected with an ONLINE KEY, decryption is impossiblewithout the victims specific private key.ONLINE KEYS are unique for each victim and randomly generated in a secure manner with unbreakable encryption. Emsisoft cannot help decrypt files encrypted with the ONLINE KEY due to the type of encryption used by the criminals and the fact that there is no way to gain access to the criminal's command server and retrieve this KEY.ONLINE ID'sfor new STOP (Djvu) variants arenot supportedby theEmsisoft Decryptor

TheEmsisoft Decryptorwill also tell you if your files are decryptable, whether you're dealing with an "old" or "new" variant of STOP/Djvu, and whether your ID is ONLINE or OFFLINE.

Emsisoft has obtained and uploaded to their server OFFLINE IDs for many(but not all)of the new STOP (Djvu) variantsas noted inPost #9297and elsewhere in the support topic.

**If there is no OFFLINE ID for the variantyou are dealing with,we cannot help you unless a private key is retrieved and provided toEmsisoft. When and if the private key for any new variant is obtained it will be pushed to the Emsisoft server and automatically added to the decryptor. Thereafter, any files encrypted by the OFFLINE KEY for that variant can be recovered using theEmsisoft Decryptor. For now, the only other alternative to paying the ransom, is tobackup/save your encrypted data as is and wait for possible future recovery of a private key for an OFFLINE ID.

There is no timetable for when or if a private key for an OFFLINE ID will be recovered and shared with Emsisoft and no announcement by Emsisoft when they arerecovereddue tovictim confidentiality. That means victims should keep reading the support topic for updates orrun the decryptor on a test sample of encrypted files every week or twoto check if Emsisoft has been able to obtain and add the private key for the specific variant which encrypted your data.

** If an OFFLINE ID is available for the variant you are dealing with and your files were not decrypted by Emsisoft Decryptor, then you most likely were encrypted by anONLINE KEYand those files arenot recoverable(cannot be decrypted) unless you pay the ransom to the criminals and receive the private key.If infected with an ONLINE ID, theEmsisoft Decryptorwill indicate this fact under theResults Taband note the variant is impossible to decrypt.

You need to post any questions in the above support topic.If you have followed those instruction and need further assistance, then you still need to ask for help in that support topic.

Rather than have everyone with individual topics and to avoid unnecessary confusion, this topic is closed.

ThanksThe BC Staff

More:
ransomeware threat.files are encrypted with .moqs extension - Ransomware Help & Tech Support - BleepingComputer

AES Encryption Software Market Growth in the Forecast Period of 2021 to 2026 With Top Companies: , Dell, Eset, Gemalto, IBM, Mcafee Domestic Violence…

The Global AES Encryption Software industry comprises numerous aspects and each has been shocked by the covid-19 crisis. The quarterly sales volume at regional and global level is also fluctuated. Some businesses have responded positively to the uncertainties while some have struggled to survive. This global AES Encryption Software market report examines the likely impact of covid-19 on the AES Encryption Software industry in the near term and current situation of the market with respect to reopening of the market. The report explores how the pandemic could fundamentally change the AES Encryption Software industry in the next ten years period. The report explores how the retailers, investors, and market players are adapting to the changing market environment. The report gives a short-term outlook of the global AES Encryption Software industry. The report has studied the epidemiological trends and effectiveness of thenew policy decisions by the regulatory authorities.

Request a sample of this report @https://www.orbisresearch.com/contacts/request-sample/4215463?utm_source=Rohit

This study covers following key players:

DellEsetGemaltoIBMMcafeeMicrosoftPkwareSophosSymantecThales E-SecurityTrend MicroCryptomathicStormshield

Key Manufacturers:

The report evaluates the performance of the key manufacturers based on their total annual revenue, total sales, global expansion, and customer reach. Moreover, the report highlights the market contribution of the key manufacturers to the global AES Encryption Software industry. The competitive intelligence about the key manufacturers is evaluated in the report. Their response to the changing market conditions, marketing strategies, technology developments, annual sales, and supply chain functions are detailed in the report.

Regional Analysis:

The vital factors pertinent to the regional analysis such as location, market size, and projections are taken into consideration. Moreover, the political, social and economic forces that are driving the regions are studied in the report. The global AES Encryption Software market report gives a better understanding of the regions by highlighting the evolving trends and the impact of the trends on the companies operating in the regions. The key market regions are studied comprehensively to examine the competitiveness of AES Encryption Software industry. The report provides valuable information of the market which is beneficial for all the market participants across the globe. Market companies operating in the regions are deeply studied and their developmental opportunities in the next five years.

Browse the complete report @ https://www.orbisresearch.com/reports/index/global-aes-encryption-software-market-size-status-and-forecast-2020-2026?utm_source=Rohit

Market segment by Type, the product can be split into

On-premisesCloud

Market segment by Application, split into

Disk EncryptionFile/folder EncryptionDatabase EncryptionCommunication EncryptionCloud Encryption

For Enquiry before buying report @ https://www.orbisresearch.com/contacts/enquiry-before-buying/4215463?utm_source=Rohit

Crucial Questions Answered In The Report:

Why Buy this Report?

The product specifications, annual revenue, investment cost, pricing structure, distribution channels, and marketing techniques of the leading players are provided in the report.

About Us:Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us:Hector CostelloSenior Manager Client Engagements4144N Central Expressway,Suite 600, Dallas,Texas 75204, U.S.A.Phone No.: USA: +1 (972)-362-8199 | IND: +91 895 659 5155

View original post here:
AES Encryption Software Market Growth in the Forecast Period of 2021 to 2026 With Top Companies: , Dell, Eset, Gemalto, IBM, Mcafee Domestic Violence...

AG Tong Alerts Businesses and Government Entities to Protect Operations and Personal Information – CT.gov

Press Releases

07/29/2021

(Hartford, CT) Following an unnerving increase in the frequency and scale of ransomware attacks across the globeunderscored by the massive attack on software company Kaseya on the brink of the July 4th holiday weekendAttorney General William Tong is leading a bipartisan coalition of attorneys general in urging businesses and government entities to immediately assess their current data security practices and take appropriate steps to protect operations and consumer data.

Ransomware is a form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Cybercriminals demand ransom in exchange for decryption, often threatening to sell or leak exfiltrated information if the ransom is not paid. Ransomware is a growing threat, generating billions of dollars in payments to cybercriminals and inflicting significant damage on businesses and government entities alike.

Earlier this month, REvila Russian-linked cybercrime gangperpetrated the single largest global ransomware attack on record against the software company Kaseya. REvils supply-chain attack on Kaseyas VSA software is believed to have infected thousands of client systems in at least 17 countries. A wide variety of businesses and public agencies were victims of the massive attack. REvil demanded $70 million in cryptocurrency in exchange for decrypting all affected machinesbut in an usual twist, by July 14, the group had disappeared from the Internet, along with sites where it directed its victims to negotiate and receive decryption tools. Last week, Kaseya announced that it had obtained a decryption key through a trusted third party and strongly denied having paid any ransom. This was REvils second high-profile attack in recent weekshaving extorted $11 million from JBS Foods, the worlds largest meat-processor, last month.

More than ever information systems of American businesses are under attack, threatening not just consumer data, but critical infrastructure, Attorney General Tong said. The sad reality is that no one is saferegardless of size or whether you are in the public or private sectorand we all must act to protect our systems.

Attorney General Tong co-chairs the National Association of Attorneys Generals Internet Safety / Cyber Privacy and Security Committee, which serves as a resource for the attorney general community to discuss privacy issues. The Committee members joint advisory echoes a June 2, 2021 memo issued by Anne Neuberger, Deputy Assistant to the President and Deputy National Security Advisor for Cyber and Emerging Technology, titled What We Urge You To Do To Protect Against The Threat of Ransomware. The memo discusses the pressing threat that ransomware attacks pose to American businesses and government entities and recommends several best practices to respond to the threat and providing the following recommendations:

Implement the five best practices from the Presidents Executive Order: The Presidents Executive Order on Improving the Nations Cybersecurity outlines five high-impact best practices that will significantly reduce the risk of a cyberattack: multifactor authentication (because passwords alone are routinely compromised), endpoint detection and response (to hunt for malicious activity on a network and block it), encryption (so if data is stolen, it is unusable) and a skilled, empowered security team (to patch rapidly, and share and incorporate threat information in your defenses).

Backup your data, system images, and configurations, regularly test them, and keep the backups offline: Ensure that backups are regularly tested and that they are not connected to the business network, as many ransomware variants try to find and encrypt or delete accessible backups. Maintaining current backups offline is critical because if your network data is encrypted with ransomware, your organization can restore systems.

Update and patch systems promptly: This includes maintaining the security of operating systems, applications, and firmware, in a timely manner. Consider using a centralized patch management system; use a risk-based assessment strategy to drive your patch management program.

Test your incident response plan: There is nothing that shows the gaps in plans more than testing them. Run through some core questions and use those to build an incident response plan: Are you able to sustain business operations without access to certain systems? For how long? Would you turn off your manufacturing operations if business systems such as billing were offline?

Check your security teams work: Use a third-party penetration tester to test the security of your systems and your ability to defend against a sophisticated attack. Many ransomware criminals are aggressive and sophisticated and will find the equivalent of unlocked doors.

Segment your networks: There has been a recent shift in ransomware attacksfrom stealing data to disrupting operations. It is critically important that your corporate business functions and manufacturing/production operations are separated and that you carefully filter and limit internet access to operational networks, identify links between these networks, and develop workarounds or manual controls to ensure industrial control system (ICS) networks can be isolated and continue operating if your corporate network is compromised. Regularly test contingency plans such as manual controls so that safety critical functions can be maintained during a cyber incident.

All organizations face the threat of a ransomware attack. Guidance and resources from the U.S. Cybersecurity & Infrastructure Security Agency (CISA) on how to guard your organization against ransomware attacks can be found here. CISA and the Federal Bureau of Investigation (FBI) have also issued specific guidance for managed service providers (MSPs) and their customers affected by the Kaseya ransomware attack, discussed above. This guidance can be found here.

The National Institute of Standards and Technology (NIST) also provides guidelines and best practices for organizations to manage and reduce cybersecurity risk, which can be found here.

Victims of ransomware should report it immediately to CISA, a local FBI Field Office, or Secret Service Field Office. Victims should also file a report online through the Internet Crime Complaint Center (IC3).

Attorney General Tong is joined by the attorneys general of Arizona, Colorado, Hawaii, Guam, Mississippi, North Dakota and Utah.

Elizabeth Bentonelizabeth.benton@ct.gov

860-808-5318attorney.general@ct.gov

See more here:
AG Tong Alerts Businesses and Government Entities to Protect Operations and Personal Information - CT.gov

Amazon prepares to accept bitcoins and develop an encryption strategy – BollyInside

Indeed, Amazon has confirmed to Business Insider that it is going to accept cryptocurrencies, but did not reveal when exactly this is set to happen. Business Insiderhas foundan Amazon job listingthat seeks a leader who will develop the retailers Digital Currency and Blockchain strategy as well as a product roadmap. The future employee of Amazon will be a part of The Amazon Payment Acceptance & Experience Team is responsible for how Amazons customers pay on Amazons sites and through Amazons services around the globe, which pretty much implies that one of the worlds biggest retailers will start accepting cryptocurrency as payments sometimes in the future.

Amazon used to be pretty sceptic about cryptocurrencies back in 2017 due to lack of demand, but as more people start using cryptocurrencies to keep their savings or make investments, there are obviously enough parties interested in using various digital coins for payments and avoid their conversion to real money.

Weare inspired by the innovation happening in the cryptocurrency space and are exploring what this could look like on Amazon,a statement by Amazon reads. We believe the future will be built on new technologies that enable modern, fast, and inexpensive payments, and hope to bring that future to Amazon customers as soon as possible.

What remains to be seen is how Amazon plans to mitigate volatility of cryptocurrencies like Bitcoin that can fluctuate significantly even during a week. Perhaps, the company will simply convert Bitcoins to real money quickly. Alternatively, it may attempt to make some additional profits by waiting till a digital currency goes up in price.

But no matter what Amazon will do with cryptocurrencies it gets as payments, the very idea that such a large retailer will accept cryptocurrencies increases their value and makes some of the holders richer.

Disclaimer: If you need to update/edit this news or article then please visit our help center.

Read more from the original source:
Amazon prepares to accept bitcoins and develop an encryption strategy - BollyInside

The 5 Most Explosive Claims Made In The Four Corners x Hack Investigation Into TikTok – Pedestrian TV

CONTENT WARNING: This article discusses disordered eating.

A joint investigation by ABCs Four Corners and Triple J Hack that aired on Monday night has made explosive claims about TikToks algorithm and data practices, saying that the app can expose users to dangerous content with real-life impacts through its algorithms, data harvesting, and censorship.

Here are the five biggest claims to come from the report.

It takes less than 30 seconds to find harmful content on TikTok, and a few hours for the algorithm to dominate someones feed with offensive videos, according to several researchers, the Four Corners report claimed.

The report referenced tech advocacy organisation Reset Australia, citing their experiments that discovered it takes about four hours for the algorithm to learn that a 13-year-old is interested in racist content, and about seven hours for sexist videos to swamp someones feed.

Laura Hemmings, a university student, spoke to Four Corners about joining the app to watch funny videos, but said after she followed a fitness influencer, the algorithm appeared to push her toward viral calorie-counting trends.

After four months on TikTok, Lauren was diagnosed with an eating disorder.

According toSwinburne Universitys Dr Suku Sukunesan, who advises TikTok on how to make the app safer, TikTok videos can basically teach people how to have an eating disorder because the algorithm sends vulnerable young people toward similar content.

I was immediately given all this eating disorder content. After a couple of hours, TikTok suggested 30 different accounts to follow and they were all people living with eating disorder issues, he said on the episode, after embedding himself into TikToks eating disorder community.

Its almost like a pit with no end and you find that these kids would ultimately harm themselves more.

Claire Benstead, a 22-year-old who has been in and out of hospital over the last five years due to suffering from an eating disorder, was in recovery when she joined TikTok. Her algorithm quickly suggested videos relating to eating disorders to her, which she claims eventually led to her relapse.

Benstead tried cleaning up her feed by reporting videos that promoted eating disorders, but says she was told that the videos she reported did not breach TikToks guidelines.

The app also claims to ban content depicting, promoting, normalising, or glorifying activities that could lead to suicide, self-harm, or eating disorders, with a TikTok spokesperson telling the ABC:

Our teams consult with NGOs and other partners to continuously update the list of keywords on which we intervene,

Another TikTok user told Hack and Four Corners that she reported a viral video of a man taking his own life, and claims that she was also told it did not breach any community guidelines.

Claims that TikTok has a racial bias are not new. Last year, TikTok apologised forhiding posts with the hashtags Black Lives Matter and George Floyd as thousands of creators complained about being silenced, citing a glitch.

Earlier this month, TikTok user Ziggi Tyler went viral for showing how the platform flagged words such as Black, Black success, and Black Lives Matter in his bio as inappropriate content, but not terms such as neo-nazi and white supremacist.

TikTok shared a statement toForbes which read: Our TikTok Creator Marketplace protections, which flag phrases typically associated with hate speech, were erroneously set to flag phrases without respect to word order.

We recognise and apologise for how frustrating this was to experience, andour teamhas fixed this significant error. To be clear, Black Lives Matter does not violate our policies and currently has over 27 billion views on our platform.

The Four Corners x Hack report featured interviews with two creators of colour, Unice Wani (@unicewani) and Paniora Nukunuku (@pnuks), who discussed being shadow banned from TikTok for creating videos discussing race. (Shadow banning is term for when videos or posts are hidden from a platforms feed without explicitly being banned or taken down).

Nukunuku told the ABC that his videos on life with a disability are sometimes pinged for violating community guidelines, despite not breaking any rules.

Wani claims that a video he posted about Black Lives Matter saw his account banned for a week, and a video he put up in support of Palestinian protests was removed just hours after he posted it.

You tend to get a lot of shadow bans for speaking up about stuff such as racism I guess they focus more on the white girls dancing and stuff like that, Wani said.

The Four Corners report claimed that TikTok doesnt just mine facial data from the videos uploaded onto the app, but also from videos users might record on the app and never upload, or any videos and photos in their camera rolls.

The report alleged that the app analyses faces for personality and demographic traits, using that information to create a profile of the user and create a more accurate algorithm.

Anne Longfield, the former Childrens Commissioner for England, is leading a class-action lawsuit alleging that every child who has used TikTok since May 25, 2018, may have had private personal information illegally collected by ByteDance (TikToks parent company) through the platform for the benefit of unknown third parties.

Parents and children have a right to know that private information, including phone numbers, physical location, and videos of their children are being illegally collected, she said.

The lawsuit is demanding TikTok delete any personal information it has stored regarding children.

TikTok has strongly denied the allegations, with arepresentative saying the companys top priorities are privacy and safety and that the platform has plenty of policies, processes and technologies in place to protect all its users, including the younger end of the demographic.

We believe the claims lack merit and intend to vigorously defend the action, the representative for TikTok told the ABC.

The Four Corners x Hack report referenced an academic investigation by The Australian Strategic Policy Institute (ASPI) which found that TikTok appears to use its algorithm to hide political speech that it thinks is controversial.

The US State Department funded the study which found hashtags relating to mass detention of Chinese Muslim minority Uyghurs, pro-democracy Hong Kong protests, LGBTQI issues and anti-Russian government videos were just some of the content that appeared to be hidden by TikTok.

We see evidence of how content moderation that takes place in China, how that type of thinking is still applied to TikTok outside of China, ASPIs Fergus Ryan said.

As it has expanded around the world, and particularly after its received a lot of scrutiny, the company has tried to, as much as possible, disconnect TikTok, the company, from its roots in China. But ultimately, those links cant be fully severed.

In a statement, TikTok vehemently denies companys involvement in political censorship.

We do not moderate or remove content based on political sensitivities. We have never removed content at the request of the Chinese government, nor have we been asked to.

You can read the full investigation into the TikTok spiral over at the ABCor watch the Four Corners episode here.

If you need support, give Butterfly Foundation a call on 1800 33 4673 or chat online.

If you are in distress, please call Lifeline on 13 11 14 or chat online.

Under 25? You can reach Kids Helpline at 1800 55 1800 or chat online.

Visit link:

The 5 Most Explosive Claims Made In The Four Corners x Hack Investigation Into TikTok - Pedestrian TV

Punishing the conscientious – The News International

In this world of narrow nationalism and blind patriotism, it is difficult to follow the dictates of ones conscience. Most people are influenced by state propaganda and the rhetoric of their leaders, failing to realize that states are created by human beings that can commit mistakes, sometimes even grave blunders, plunging humanity into an abyss of barbarism.

Veneration of national political entities and obeisance to populist demagogues pushed the world towards the verge of destruction several times in the past 100 years. The fanatical personality cult of the 1930s and 1940s turned Germans and Italians into mobs of hero worshippers while chauvinism blinded the Japanese and other modern nations that pushed the world towards a terrible conflagration during the two world wars.

The English, French, American and other nations were not immune to this collective insanity that had swept through Europe and several other parts of the globe. The consequences were catastrophic: more than 10 million perished during the first mass slaughter also known as World War I; the second mass bloodshed claimed around 70 million lives.

Amidst this hysteria of nationalism, few individuals dared to challenge the myopic view of their people, questioning the rationale of waging an insane war that had the potential of wiping out the entire humanity. Bertrand Russell, Jean Paul Sartre and a number of other conscientious individuals did not succumb to the frenzy of chauvinism, refusing to justify the annihilation of cities, blitzkrieg of towns and devastation of villages in the name of protecting petty national interests. Those who could not take to streets against the horror of wars, penned heart-wrenching accounts of atrocities committed by all sides during the battles or depicted the inhumanity of humans through their art, drama and poetry.

It was the valour of these noble personalities that established the basis of the anti-war movement in modern times. Their spirit of resistance inspired successive generations in the West who staged massive demonstrations against the Vietnam War, besides speaking against the possible horrors of any nuclear wars, prompting people to mobilise themselves against the plans of the Western ruling elite to annihilate the world in a war of total destruction. It was this awareness that prompted the Russian leadership to back out amidst the tensions that arose from the Cuban Missile Crisis, reminding Washington as well that people would not support any militaristic adventure that could jeopardise their very existence. This defiance by people also deterred the two global powers in the decade of the 1980s from plunging the world into a nuclear holocaust.

The spirit of anti-war sentiment did not fade away with the demise of the Soviet Union. In fact, it got momentum during the first Gulf war and the bombardment of Yugoslavia. The illegal invasion of the US against Iraq also prompted millions of people who vehemently opposed the US aggression, reminding the sole superpower that opposition to war-mongering still matters.

Although such movements could not prevent the invasions, they created a strong revulsion against military adventures in different strata of Western society. Perhaps it was this abomination and horrors of atrocities committed during the conflict that encouraged people like Bradley Manning, Edward Snowden and many others to expose obnoxious plans of American ruling elites of imposing wars and conflicts on the world. Journalists like Julian Assange helped the gullible American people see the real face of their civilized leaders who not only destroy state after state under false excuses but also order civilian killings in the name of protecting national interests and the countrys security. It seems that the Western ruling elite considers such individuals a great threat, forcing Snowden to flee the country, imprisoning Assange and teaching a tough lesson to Manning.

Recently another conscientious American has been punished for venting his anger against the killing of innocent civilians in Afghanistan. Daniel Hale Nashville, a former air force intelligence analyst, was handed down a 45-month imprisonment on Tuesday for leaking top secret information about the US governments drone strike programme to a journalist.

It seems that Nashville refused to buy the argument of his ruling elite which asserts that drone strikes were meant to only target terrorists. He told the court that he was motivated by guilt and a desire for transparency when he disclosed to an investigative reporter details of a military drone programme that he believed was indiscriminately killing civilians in Afghanistan far from the battlefield.

His statement in court should be incorporated into the syllabus of schools not only in the West but across the world because it reflects the desire of an altruistic person to prevent killings in general and that of innocent civilians in particular. According to Western media, he said, I believe that it is wrong to kill, but it is especially wrong to kill the defenceless. He claimed that he had shared what in his view was necessary to dispel the lie that drone warfare keeps us safe, that our lives are worth more than theirs.

Charges against the air force officer had been brought by the administration of Donald Trump, an erratic chief executive of the US who also dropped the mother of all bombs on one of the poorest countries of the world where Nashville was posted in August 2012, witnessing the horrors of the conflict himself. Disregarding Nashvilles conscience, the judge blinded by dictates of national interests sent the air force officer behind bars, saying that it would deter others.

The drone strikes had been ordered by the sagacious Barack Obama, the first black chief executive in the US whose victory had triggered euphoria among many doves who had hoped that the US would be dictated by the norms of international law and not the whims of any powerful incumbent of the Oval Office but such hopes were dashed to dust when the Obama administration ordered one of the largest drone operations in recent US history. Instead of the former chief executive being summoned for ordering such killings, a conscientious officer has been punished for speaking truth to power.

Such punishment is a blot on the American judicial system. It will create an impression that the lives of Americans are more important than those of others. How can revelations of such illegal activities harm America's national interests? How can they undermine American security? Which terrorist used this information to harm Americans? His revelations only belied the tall claims of the American administrations that drone strikes were precise. Is it not a fact that it targeted hundreds or possibly thousands of innocent civilians in countries like Afghanistan, Pakistan, Somalia and others? Is it not true that such strikes carry no legal weight and are illegal under international laws?

It is very unfortunate that the corporate media is busy fawning over billionaires for shooting into space, while ignoring their real job which is to search for the truth. They however prefer to highlight celebrity gossip and futile errands of the super rich instead of at least following up on such revelations. The world has witnessed more than 240 conflicts since 1945. Washington has been involved in most of these conflicts on one or another pretext, which turned out to be completely concocted.

If the world is to avoid more deaths and destruction, we need conscientious people like Nashville not only in the streets of the mighty state but in all parts of the Western world. Punishing the conscientious is shameful. It is rather the war-mongers who caused the destruction of Afghanistan, Iraq, Libya, Syria and other states that should be behind bars.

The writer is a freelance journalist.

Email: [emailprotected]

Read the rest here:
Punishing the conscientious - The News International

UW to lead new NSF institute for using artificial intelligence to understand dynamic systems – UW News

Engineering | News releases | Research | Science | Technology

July 29, 2021

The UW will lead a new artificial intelligence research institute that will focus on fundamental AI and machine learning theory, algorithms and applications for real-time learning and control of complex dynamic systems, which describe chaotic situations where conditions are constantly shifting and hard to predict.Andy Freeberg/University of Washington

The U.S. National Science Foundation today announced 11 new artificial-intelligence research institutes, including one led by the University of Washington. These institutes are part of a $220 million investment spanning seven research areas in AI. Each institute will receive about $20 million over five years.

J. Nathan KutzUniversity of Washington

The UW-led AI Institute for Dynamic Systems will focus on fundamental AI and machine learning theory, algorithms and applications for real-time learning and control of complex dynamic systems, which describe chaotic situations where conditions are constantly shifting and hard to predict.

The engineering sciences are undergoing a revolution that is aided by machine learning and AI algorithms, said institute director J. Nathan Kutz, a UW professor of applied mathematics. This institute brings together a world-class team of engineers, scientists and mathematicians who aim to integrate fundamental developments in AI with applications in critical and emerging technological applications.

Researchers know the basic physics principles behind dynamic systems, which include situations such as turbulence or how the body recovers from an injury. But these scenarios are often happening on multiple timescales at once and can be a combination of many types of physics, making it hard for researchers to understand exactly whats going on.

My favorite dynamic system is turbulence, said institute associate director Steve Brunton, a UW associate professor of mechanical engineering. We literally live and breathe inside of a working fluid, and so do nearly all of our machines. But because of the multiscale complexity of the fluid, which involves a cascade of increasingly smaller eddies, we still have an incredibly hard time predicting what fluids will do outside of idealized and controlled settings.

The overall goal of this institute is to integrate physics-based models with AI and machine learning approaches to develop data-enabled efficient and explainable solutions for challenges across science and engineering.

Some of our specific questions include: Can we develop better machine-learning technologies by baking in and enforcing known physics, such as conservation laws, symmetries, etc.? Brunton said. Similarly, in complex systems where we only have partially known or unknown physics such as neuroscience or epidemiology can we use machine learning to learn the physics of these systems?

In addition to research, the institute will be focused on training future researchers in this field throughout the education pipeline. Some examples include: partnering with high school programs that focus on AI-related projects and creating a post-baccalaureate program that will actively recruit and support recent college graduates from underrepresented groups, United States veterans and first-generation college students with the goal of helping them attend graduate school.

The institute will provide massive open-source educational materials that include lectures, data and code packages for advancing and empowering AI, Kutz said. Importantly, we will provide AI ethics training for all involved in the institute. We will also make this training available to the community at large, thus enforcing a disciplined approach to thinking about AI and its implications for our emerging societal concerns around data, data privacy and the ethical application of AI algorithms.

As part of the educational component, the team will use a lightboard (Steve Brunton shown here) to create a range of high-quality educational and research videos focusing on key aspects of AI and machine learning for engineering dynamical systems and control. Educational content will be made freely available to the community on YouTube.Dennis Wise/University of Washington

For this institute, the UW is partnering with several regional institutions the University of Hawaii at Mnoa, Montana State University, the University of Nevada Reno, Boise State University, the University of Alaska Anchorage and Portland State University as well as with Harvard University and Columbia University.

We are so excited to bring together a critical mass of amazing and innovative researchers from across the U.S. to really move the needle in developing machine learning technology for physical and engineering dynamic systems, Brunton said. We also have a deep connection with industry partners, such as Boeing, which provides us with an incredible opportunity to make sure that we are focused on important and relevant problems and that our technology will actually be used.

Additional UW researchers who are part of this institute are lead researcher Krithika Manohar, assistant professor of mechanical engineering; Maryam Fazel, professor of electrical and computer engineering; Daniela Witten, professor of biostatistics; and David Beck, a research associate professor of chemical engineering.

Im glad to see this substantial investment going to one of our states premier research institutions, said U.S. Sen. Patty Murray, D-Wash. As the University of Washington and other research institutions in our state continue to lead on artificial intelligence, this investment will be critical to ensuring that the state of Washington remains a leader in innovation, research and scientific achievement. Ill keep fighting for important federal investments like this one to move this work forward.

The UW is also a partner institution on another newly announced NSF institute, the AI EDGE Institute, which is led by Ohio State University. The goal of this institute is to design future generations of wireless edge networks that are highly efficient, reliable, robust and secure.

These 11 new AI institutes are building on the first round of seven AI institutes funded in 2020, and expand the reach of these institutes to include a total of 40 states and Washington D.C.In addition to the UW-led institute, the state of Washington will also house the Institute for Agricultural AI for Transforming Workforce and Decision Support, or AgAID Institute, led by Washington State University. The institutes goal is to use AI to tackle some of agricultures biggest challenges related to labor, water, weather and climate change.

The state of Washington is already a leader in artificial intelligence, said U.S. Sen. Maria Cantwell, D-Wash. From the University of Washingtons Tech Policy Lab that studies the grand challenges around artificial intelligence to Washington State Universitys work in precision agriculture, we are more than ready for these two grants to help us understand more artificial intelligence applications.The UW will work in the area of complex systems to improve fields like manufacturing, and WSU will work on improvements in farming.

The AI Institute for Dynamic Systems is partially funded by the U.S. Department of Homeland Security.

For more information, contact Kutz at kutz@uw.edu and Brunton at sbrunton@uw.edu.

See original here:
UW to lead new NSF institute for using artificial intelligence to understand dynamic systems - UW News

Human Assisted Artificial Intelligence: A Pathway to Trustworthy And Unbiased AI – Forbes

While the country continues to struggle convincing people it is safe and smart to get vaccinated against Covid-19 despite emergency authorization and advocacy from the U.S. Federal Drug Administration (FDA), other growing numbers of people are willing to jump in with both feet when it comes to trusting their lives to Artificial Intelligence (AI), which has no standards or organizational oversight. At this time, only guidelines exist from the U.S. Federal Trade Commission (FTC) for AI.

I will take you through an example of how even impactful applications of AI still need a human assistant to ensure trustworthy, explainable, and unbiased decision making.

Internet law concept with 3d rendering ai robot with law scale

Using AI for automating manufacturing and improving our work streams, such as providing robust CMMS (computerized maintenance management systems) is an excellent application for AI. CMMS is a proactive methodology to keep systems running and to optimize maintenance operations. Alternatively, if businesses and institutions dont invest in smart maintenance approaches and choose only to take action after a system fails, it ultimately impacts operations, and customer service. Especially, if the components needed for repair are not readily available.

CMMS systems utilize sensors and other Internet of Things (IoT) devices and leverage on cloud services. They can track equipment assets, sense whether device performance is degrading, maintain the history of repair times and help us determine whether it is time to invest in replacing or upgrading systems versus investing in more repairs. AI can be used to look at this plethora of data and help make inferences that could save money, anticipate risk factors and build risk mitigation plans.

So far in this example, it appears that an individual human cant be adversely affected by the AI used in this CMMS application. However, lets consider a scenario when a relationship appears between the number of times a repair was done on a device that repeatedly failed and the person who performed that repair.

Does this indicate that the repair person needs more training or does it simply mean the device has too many faults and should be replaced? This is when the AI needs to ask a human for help and the human needs to be smart about interpreting what the data means.

Whenever AI makes a decision on a humans livelihood or is used to evaluate an individuals competency, we need to hit the big red STOP button and understand how the AI is making decisions and what it means. There have been many examples of companies using AI to evaluate employee job performance, which resulted in the subsequent dismissal or poor evaluations of employees. Lending institutions using AI have encountered algorithms that have unfairly eliminated underrepresented groups of individuals from qualifying for loans.

This kind of blind faith in computer generated decisions gives me a flashback to high school when they gave us career assessment tests to match us to a future vocation.

I was at the top of my class and my best friend, a male had scored slightly lower than I did in math and science. We were both expecting the outputs of our career assessments to be similar. How wrong I was!

His assessment said he could become an engineer, scientist, or politician. The results of my assessment, said I could be a cook, or sell cosmetics.

True fact:I stink at cooking. I never could cook and I still cant. Furthermore, it would be cruel and unjust for anyone to be subjected to eating my cooking.

When I complained to the guidance counselor, he reminded me that the results had to be correct, because this was a computer generated result and therefore it had to be accurate. Thankfully, I have always been a rebel and I ignored that assessment and went on to become an engineer.

AI has so much potential, but it has a long way to go before it can be considered a standalone replacement for human decision making that is trustworthy and unbiased.

In a recent IEEE/IEEE-HKN webinar, Dr.Manuela M. Veloso, Head of J.P. Morgan AI Research discussed human assisted AI as the bridge in the quest to help create more robust trustworthy AI. Including the human in the loop while the AI is exploring the data and asking the human for help is a new paradigm that many have leaped over to expedite the use of AI. Its time to embrace that Human Assisted AI is necessary if we are to move forward developing robust applications of AI. We need to demystify AI as a building block and have a way for the AI to declare it needs help from its human partner.

Finally, we need to be vigilant questioning the decisions from AI and help lawmakers develop standards to prevent blind trust in computer generated outputs that could have disastrous impacts of turning aspiring engineers into horrible cooks.

The rest is here:
Human Assisted Artificial Intelligence: A Pathway to Trustworthy And Unbiased AI - Forbes

Artificial intelligence uncovers the building blocks of life and paves the way for a new era in science – EL PAS in English

Humans have been seeking the answer to a colossal challenge for half a century: identifying the basic building blocks of life, essential knowledge in the battle against terminal illnesses. Water is easy to imagine. It is simply two hydrogen atoms connected to another of oxygen: HO. But the protein that enriches blood, hemoglobin, carries the less memorable formula CHNOSFe. In 1969, US biologist Cyrus Levinthal calculated that it would require more time than has passed since the formation of the universe around 14 billion years to untangle all the potential configurations of a single protein from its amino acid sequence, which are the links of these macromolecules. However, an artificial intelligence system created by the Google conglomerate has achieved this feat in just a few minutes. Its predictions for practically every single human protein were published last week in a giant step for biology that has removed a blindfold from human knowledge.

At the vanguard of this revolution is British neuroscientist Demis Hassabis. The 44-year-old researcher was a chess child prodigy who in 1997 was left in awe of the match between Russian grandmaster Garry Kasparov and the super computer Deep Blue. The machine beat the man, but Hassabis was left with the impression that it was a cumbersome piece of junk, and useless in a game of tic-tac-toe. When the final game was over, the University of Cambridge undergraduate came up with the idea of designing a machine that could learn any game. In 2010, Hassabis founded a company called DeepMind to lead the investigative drive toward Artificial Intelligence (AI). In 2013, his first creation taught itself to play and win at various games on the legendary Atari console. In 2014, Google bought DeepMind for $650 million (around 500 million at the exchange rate of the time).

After limbering up on video games, the scientists at DeepMind then set themselves the task of solving one of the greatest challenges in biology. Proteins like hormones, enzymes and antibodies are tiny machines that carry out the basic functions of life. They are made up of chains of smaller molecules, amino acids, much like a pearl necklace. These necklaces are folded in convoluted configurations that determine their function. Antibodies, the human bodys defense mechanism against invaders like the coronavirus, have a Y shape.

The recipes of all the proteins required to function are written in the DNA of every cell. The DeepMind system, baptized AlphaFold, reads this information a sequence of amino acids and predicts the structure of each protein. Its precision is similar to that achieved in laboratory experiments, which require considerably more time and money. It is like guessing the structure of a quiche after seeing pie crust, eggs, pepper, salt, milk and cream for the first time.

DeepMind and the European Molecular Biology Laboratory (EMBL) published more than 350,000 structures on July 22, including some 20,000 human proteins and those of 20 other organisms, such as a lab mouse and the tuberculosis bacteria. Venki Ramakrishnan of the Medical Research Council Laboratory of Molecular Biology in Cambridge and winner of the 2009 Nobel Prize in Chemistry, says that is an astonishing advancement with unpredictable consequences. It has taken place long before many experts had predicted. It is going to be exciting to see the many ways in which it is going to radically change biological investigation.

Some organizations are already working with the new database. The Drugs for Neglected Diseases initiative, a global non-profit set up with the aid of Doctors Without Borders, uses the structure of proteins to seek new treatments. Practically all diseases, from cancer to Alzheimers, and including Covid-19, are related to the structure of one protein or another. Other institutions, such as the University of Portsmouth in the UK, are using the program to try and design proteins capable of recycling plastic.

Hassabis, executive director of DeepMind, has announced the companys plan is to publish 100 million structures over the next few months. The idea is to offer the predictions for the structure of practically every protein with a known sequence of amino acids free of charge. We believe that this is the most important contribution to date that artificial intelligence has contributed to scientific knowledge, he said following the publication of DeepMinds research in the medical journal Nature.

The AlphaFold system was not created from nothing, as Edith Heard, director general of the EMBL, has emphasized. AlphaFold has been trained using data from public resources developed by the scientific community, so it makes sense that its predictions are also made public. In Heards view, the system represents a genuine revolution in life sciences, like the genome was decades ago.

To determine the real structure of a protein, hugely expensive infrastructure is required, such as the European Synchrotron Radiation Facility, a particle accelerator covering almost a square kilometer in Grenoble, France. The radiation emitted by the electrons that circle the ring, which basically consist of X-rays, allow researchers to observe the secrets of matter. Spanish biologist Jos Antonio Mrquez explains that elucidating the shape of a protein with a synchrotron, or with the alternative method of cryogenic electron microscopy, could require months or even years. AlphaFold can achieve it in minutes, albeit with errors.

We are talking about computer-generated predictions, not the experimental determination of the structure. And the precision is 58%, says Mrquez, a 52-year-old researcher who heads the Crystallography Platform at the EMBL in Grenoble. As things stand, if a scientist wants to study a protein connected to cancer, it could take months or years to analyze its structure. There are only around 180,000 structures in available databases. The information published by DeepMind has doubled that number. And in a few months millions will be available. Today it is common to not find a protein in the databases. With AlphaFold you can obtain a prediction with a 58% reliability. You save an enormous amount of time, says Mrquez, who did not participate in the project. The systems imprecisions are concentrated in specific regions of the proteins, which are unstructured to adapt to the environment.

Mrquez points out other limitations. The DeepMind system can predict the structure of an isolated molecule, but proteins tend to interact with other proteins. AlphaFold is not yet capable of predicting the structure of these complexes but it is a system designed to learn on its own. Mrquez is optimistic: It will speed up discoveries in practically all areas of biology.

Read this article:
Artificial intelligence uncovers the building blocks of life and paves the way for a new era in science - EL PAS in English