Forty-two years after unbreakable encryption was first conceived, these tools are more widespread than ever before. One milestone came in 2016, when the world’s largest messaging service—WhatsApp—announced it would offer default end-to-end encryption on all communications. In other words, the messages can be read only by the senders and recipients; even the platform provider can’t access them.
Law enforcement and intelligence agencies are still reckoning with this new reality. For decades, they demanded that tech companies hand over private data on their users, sometimes without obtaining warrants. So companies like Apple changed their policies so individual users were the only ones holding the keys to their data.
This new era of consumer privacy led to a standoff in 2016, when the Federal Bureau of Investigation (FBI) demanded access to an encrypted iPhone belonging to Sayed Farook, a deceased terrorist from San Bernardino, California. Farook and his wife, Tashfeen Malik, had killed 14 people at a holiday office party in December 2015.
The FBI wanted Apple to write software that would weaken the iPhone’s built-in security. Apple refused, saying that such flawed software would jeopardize the security of its customers, who number in the hundreds of millions. Once a back door was created, the company claimed, the FBI could use it on similar phones—and it could be leaked to hackers or foreign enemies. “It is in our view the software equivalent of cancer,” Apple CEO Tim Cook told ABC News. Read the rest of this entry »
‘Be Afraid, America. Be Very Afraid’
Joseph Weiss writes:
…I’m talking about seizing control of industrial control systems. These ubiquitous hidden computers have gradually and quietly been put in charge of all manner of critical infrastructure—including nuclear power plants, the grid, water and gas pipelines, refineries, air traffic control, trains, factories, you name it.
[Also see – Cyberwar Ignites a New Arms Race]
Unlike the computers we use in our daily lives, these computers are largely invisible. They don’t have screens or keyboards. Most people aren’t aware that they exist. And yet they are embedded in low-level processes. They are everywhere because they create tremendous efficiencies and cost savings, and because they exist almost as an afterthought, they are often completely insecure. They often don’t run anti-virus software and by and large no one bothers to scan them to see if they might be infected with malicious software. And guess what? They often are connected to the Internet where a clever hacker half a world away can get access to them!
The threat is not hypothetical. There have been almost 750 control system cyber events (including both malicious and unintentional incidents). They’ve had a global impact. Industries have included power companies, pipelines, dams, planes, and trains. Why hasn’t the public heard about them? Most often because the victims didn’t realize it since they didn’t have the right forensics….(read more)
Source: The Daily Beast
Drones are being used to capture video footage that shows construction progress at the Sacramento Kings’ new stadium.
Will Knight writes: For some construction workers, any thoughts of slacking off could soon seem rather quaint. The drones will almost certainly notice.
“It’s not new to the construction industry that there would either be people standing and observing operations, or that there would be fixed cameras. Yes, making this autonomous has a different feeling for the workers.”
The workers building a lavish new downtown stadium for the Sacramento Kings in California are being monitored by drones and software that can automatically flag slow progress.
“But you have to keep in mind that it’s not really questioning the efficiency of the workers, it’s questioning what resources these guys need to be more efficient.”
The project highlights the way new technologies allow manual work to be monitored and scrutinized, and it comes as productivity in other areas of work, including many white collar jobs, is being tracked more closely using desktop and smartphone software.
“We highlight at-risk locations on a site, where the probability of having an issue is really high. We can understand why deviations are happening, and we can see where efficiency improvements are made.”
— Mani Golparvar-Fard, an assistant professor in the department of civil engineering at the University of Illinois, who developed the software with several colleagues
Once per day, several drones automatically patrol the Sacramento work site, collecting video footage. That footage is then converted into a three-dimensional picture of the site, which is fed into software that compares it to computerized architectural plans as well as a the construction work plan showing when each element should be finished. The software can show managers how the project is progressing, and can automatically highlight parts that may be falling behind schedule.
“We highlight at-risk locations on a site, where the probability of having an issue is really high,” says Mani Golparvar-Fard, an assistant professor in the department of civil engineering at the University of Illinois, who developed the software with several colleagues. It can show, for example, that a particular structural element is behind schedule, perhaps because materials have not yet arrived. “We can understand why deviations are happening, and we can see where efficiency improvements are made,” Golparvar-Fard says.
Such additional scrutiny is controversial. It raises worries over worker privacy, for instance, and fears that people may be encouraged to work excessive hours.
“Such additional scrutiny is controversial. It raises worries over worker privacy, for instance, and fears that people may be encouraged to work excessive hours.”
Golparvar-Fard concedes that this could be an issue, but he defends the idea. “It’s not new to the construction industry that there would either be people standing and observing operations, or that there would be fixed cameras,” he says. “Yes, making this autonomous has a different feeling for the workers. But you have to keep in mind that it’s not really questioning the efficiency of the workers, it’s questioning what resources these guys need to be more efficient.” Read the rest of this entry »