Tech’s biggest companies are all trying to show you they have the most useful virtual assistant.
Just like Amazon’s Echo, Google Home, released today, has microphones tuned to hear from across the room. Both devices can be asked to cue up music on Spotify and other services, set alarms and timers, and pose factual queries. And both companies say their devices will gain powers as other companies integrate their services, letting you do things like order takeout from your couch.
But Google has a crucial advantage in the race to prove out that idea. It’s been working on technology that answers people’s questions for a long time, and has invested more heavily in machine learning than its rivals.
Early reviews suggest that advantage is already apparent. People who compared Echo, and its Alexa assistant, with Google Home found the latter to be significantly better at understanding language and answering questions. Read the rest of this entry »
Strings of code were released to the Internet by a group calling themselves ‘the Shadow Brokers’. They claim the code is a tool that can be used to hack into any computer.
The cache mysteriously surfaced over the weekend and appears to be legitimate.
Ellen Nakashima reports: Some of the most powerful espionage tools created by the National Security Agency’s elite group of hackers have been revealed in recent days, a development that could pose severe consequences for the spy agency’s operations and the security of government and corporate computers.
“Faking this information would be monumentally difficult, there is just such a sheer volume of meaningful stuff. Much of this code should never leave the NSA.”
— Nicholas Weaver, a computer security researcher at the University of California at Berkeley
A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate.
The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO).
“Without a doubt, they’re the keys to the kingdom,” said one former TAO employee, who spoke on the condition of anonymity to discuss sensitive internal operations. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.”
Said a second former TAO hacker who saw the file: “From what I saw, there was no doubt in my mind that it was legitimate.”
“Without a doubt, they’re the keys to the kingdom. The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.”
Strings of code were released to the Internet by a group calling themselves “the Shadow Brokers”. They claim the code is a tool that can be used to hack into any computer.
The file contained 300 megabytes of information, including several “exploits,” or tools for taking control of firewalls in order to control a network, and a number of implants that might, for instance, exfiltrate or modify information.
The exploits are not run-of-the-mill tools to target everyday individuals. They are expensive software used to take over firewalls, such as Cisco and Fortinet, that are used “in the largest and most critical commercial, educational and government agencies around the world,” said Blake Darche, another former TAO operator and now head of security research at Area 1 Security.
The software apparently dates back to 2013 and appears to have been taken then, experts said, citing file creation dates, among other things.
“The tools were posted by a group calling itself the Shadow Brokers using file-sharing sites such as BitTorrent and DropBox.”
“What’s clear is that these are highly sophisticated and authentic hacking tools,” said Oren Falkowitz, chief executive of Area 1 Security and another former TAO employee.
Several of the exploits were pieces of computer code that took advantage of “zero-day” or previously unknown flaws or vulnerabilities in firewalls, which appear to be unfixed to this day, said one of the former hackers.
The disclosure of the file means that at least one other party — possibly another country’s spy agency — has had access to the same hacking tools used by the NSA and could deploy them against organizations that are using vulnerable routers and firewalls. It might also see what the NSA is targeting and spying on. And now that the tools are public, as long as the flaws remain unpatched, other hackers can take advantage of them, too.
“The disclosure of the file means that at least one other party — possibly another country’s spy agency — has had access to the same hacking tools used by the NSA and could deploy them against organizations that are using vulnerable routers and firewalls. It might also see what the NSA is targeting and spying on. And now that the tools are public, as long as the flaws remain unpatched, other hackers can take advantage of them, too.”
The NSA did not respond to requests for comment.
“Faking this information would be monumentally difficult, there is just such a sheer volume of meaningful stuff,” Nicholas Weaver, a computer security researcher at the University of California at Berkeley, said in an interview. “Much of this code should never leave the NSA.”
The tools were posted by a group calling itself the Shadow Brokers using file-sharing sites such as BitTorrent and DropBox. Read the rest of this entry »
70 years after the atomic bombings, time stands still on the island of Tinian
Mark Schreiber writes:Imagine disembarking on the shore of a remote tropical island. Walking cautiously past swaying palm trees into the heavy undergrowth, you soon encounter what appears to be the fossilized bones of an enormous prehistoric creature. The thick parallel lines might have been ribs, and the long straight stretches its spine or appendages. Naturally you’re moved to wonder how it appeared when alive, how it moved about and what it ate.
For dyed-in-the-wool history buffs or those merely looking for an exotic place off the beaten track to relax, Tinian beckons. It’s an easy trip from Japan. If you take a Delta Airlines flight to Saipan during daylight hours, be sure to request a window seat on the right side of the aircraft. On the plane’s approach to neighboring Saipan, you’ll get a fantastic bird’s-eye view of the “ribs” of that prehistoric creature — the four runways of North Field — which in the waning months of World War II was the largest operational U.S. air base in the world.
Home to barely 3,000 people, the 101-sq.-km island of Tinian is one of three inhabited islands of 14 that make up the U.S. Commonwealth of the Northern Marianas. Over a period of half a century — between 1899 and 1944 — Tinian went from being controlled by Spain to Germany, Japan and finally the U.S., which in July 1944 captured the island in an eight-day campaign that was largely overshadowed by the bigger and bloodier battle on Saipan, located just 9 km to the north.
From the late 1930s, Japan had begun to augment its military presence in the Nampo Shoto (groups of islands south of the main archipelago), sending 1,280 convicts from Yokohama Prison to Tinian to expand Hagoi Field, located at the north end of the island, with a 1,450-meter-long runway.
Once in American hands, teams of U.S. Navy construction battalions (known as “CBs” or “Seabees”) swarmed over the island, eventually moving an estimated 11 million tons of coral to build runways, taxiways, buildings and some 145 km of roads. The former Japanese airstrip was extended for use by the U.S. Air Force’s new long-range B-29 bombers, adding three more 2,440-meter runways.
It was from North Field’s runway, “Able,” that a specially modified B-29 christened Enola Gay, took off in the early hours of Aug. 6, 1945, to drop the first atomic bomb ever used in warfare on the city of Hiroshima.
I’d visited Tinian once before in 2007, but left to my own devices failed to find several of the places I’d wanted to see. This time I had much better luck, thanks to an introduction to the island’s resident historian, Don Farrell.
Farrell, who’s married to a native of Tinian, has taken up the story of his new home with gusto. In addition to publishing an illustrated guidebook for visitors in 2012 titled “Tinian: A Brief History,” he’s currently nearing completion of his magnum opus, a detailed history of the atomic bomb project that promises to shed new light on Tinian’s role in the war.
Arriving at the lobby of the Tinian Dynasty Hotel and Casino clad in sandals, Bermuda shorts, aloha shirt and a baseball cap, Farrell appears like a modern-day Robinson Crusoe — if Crusoe had driven a Mazda pickup truck.
“What would you like to see?” he asks me while delivering a firm handshake.
“What do you say we retrace the actual route the bomb parts took from their arrival on the island?” I suggest.
After stopping for bottled water and gasoline, we head north. Our first destination is Tinian’s small port, where the heavy cruiser USS Indianapolis, on a top-secret mission, delivered the housing and key components of the uranium bomb on July 26, 1945. (Four days later a Japanese submarine would sink the ship east of the Philippines, with great loss of life.)
No ships, or people, are in port and there’s little left to see. We turn around and head northward on a bumpy, but still negotiable, road marked “8th Avenue.” (The roads in Tinian, named after streets in Manhattan, also include Broadway, Columbus Avenue and Riverside Drive.)
On our way north, we deviate up an overgrown hillside leading to the ruins of the Rasso Jinja, a Shinto shrine at the top of Mount Lasso, which at 171 meters marks the highest point on Tinian. Little remains of the shrine or the B-29 homing tower that stood close by. What can be seen is the concrete foundation of the old U.S. Army hospital. Read the rest of this entry »
“We’re going to gradually merge and enhance ourselves. In my view, that’s the nature of being human — we transcend our limitations.”
Kurzweil predicts that humans will become hybrids in the 2030s. That means our brains will be able to connect directly to the cloud, where there will be thousands of computers, and those computers will augment our existing intelligence. He said the brain will connect via nanobots — tiny robots made from DNA strands.
“As I wrote starting 20 years ago, technology is a double-edged sword. Fire kept us warm and cooked our food but also burnt down our houses. Every technology has had its promise and peril.”
“Our thinking then will be a hybrid of biological and non-biological thinking,” he said.
The bigger and more complex the cloud, the more advanced our thinking. By the time we get to the late 2030s or the early 2040s, Kurzweil believes our thinking will be predominately non-biological.
We’ll also be able to fully back up our brains. Read the rest of this entry »