БЛОГ

Archive for the ‘security’ category: Page 48

Oct 21, 2021

Deep North, which uses AI to track people from camera footage, raises $16.7M

Posted by in categories: biotech/medical, information science, robotics/AI, security

Deep North, a Foster City, California-based startup applying computer vision to security camera footage, today announced that it raised $16.7 million in a Series A-1 round. Led by Celesta Capital and Yobi Partners, with participation from Conviction Investment Partners, Deep North plans to use the funds to make hires and expand its services “at scale,” according to CEO Rohan Sanil.

Deep North, previously known as Vmaxx, claims its platform can help brick-and-mortar retailers “embrace digital” and protect against COVID-19 by retrofitting security systems to track purchases and ensure compliance with masking rules. But the company’s system, which relies on algorithms with potential flaws, raises concerns about both privacy and bias.

Full Story:

Oct 19, 2021

Validation of Covert Cognizance Active Defenses

Posted by in categories: mathematics, nuclear energy, robotics/AI, security, space

(2021). Nuclear Science and Engineering: Vol. 195 No. 9 pp. 977–989.


Earlier work has demonstrated the theoretical development of covert OT defenses and their application to representative control problems in a nuclear reactor. Given their ability to store information in the system nonobservable space using one-time-pad randomization techniques, the new C2 modeling paradigm6 has emerged allowing the system to build memory or self-awareness about its past and current state. The idea is to store information using randomized mathematical operators about one system subcomponent, e.g., the reactor core inlet and exit temperature, into the nonobservable space of another subcomponent, e.g., the water level in a steam generator, creating an incorruptible record of the system state. If the attackers attempt to falsify the sensor data in an attempt to send the system along an undesirable trajectory, they will have to learn all the inserted signatures across the various system subcomponents and the C2 embedding process.

We posit that this is extremely unlikely given the huge size of the nonobservable space for most complex systems, and the use of randomized techniques for signature insertion, rendering a level of security that matches the Vernam-Cipher gold standard. The Vernam Cipher, commonly known as a one-time pad, is a cipher that encrypts a message using a random key (pad) and can only be decrypted using this key. Its strength is derived from Shannon’s notion of perfect secrecy 8 and requires the key to be truly random and nonreusable (one time). To demonstrate this, this paper will validate the implementation of C2 using sophisticated AI tools such as long short-term memory (LSTM) neural networks 9 and the generative adversarial learning [generative adversarial networks (GANs)] framework, 10 both using a supervised learning setting, i.e., by assuming that the AI training phase can distinguish between original data and the data containing the embedded signatures. While this is an unlikely scenario, it is assumed to demonstrate the resilience of the C2 signatures to discovery by AI techniques.

Continue reading “Validation of Covert Cognizance Active Defenses” »

Oct 17, 2021

What Role Can Artificial Intelligence Play in Fixing the Security Skills Shortage?

Posted by in categories: education, robotics/AI, security

Demand for highly desirable digital skills is hitting new heights. A recent Learning and Work Institute report noted that one in four (27%) employers now need the majority of their workers to have in-depth specialist knowledge in one or more technology areas. And 60% of those surveyed expect their reliance on advanced digital skills to increase over the next five years.

The skills gap is particularly prevalent in the security tech sector. A global study from the Center for Cyber Safety and Education predicted a terrifying shortage of 1.8 million security workers by 2022. This is made worse by the number of young people taking IT-related GCSEs in the UK, falling by 40% since 2015 (according to Learning and Work Institute data).

This scarcity of qualified professionals has inflated salaries, making it hard for firms that cannot afford to offer large paychecks and grand benefit packages to secure top talent.

Oct 10, 2021

The Security Challenge Of Protecting Smart Cities

Posted by in categories: government, security

Creating and building a “Secure Smart City” requires strong Private Public Partnerships that incorporate people, policies, processes and technology from both government and industry into the overall strategy process.

Oct 9, 2021

AI Weekly: EU facial recognition ban highlights need for U.S. legislation

Posted by in categories: food, government, information science, law enforcement, privacy, robotics/AI, security, terrorism

This week, The European Parliament, the body responsible for adopting European Union (EU) legislation, passed a non-binding resolution calling for a ban on law enforcement use of facial recognition technology in public places. The resolution, which also proposes a moratorium on the deployment of predictive policing software, would restrict the use of remote biometric identification unless it’s to fight “serious” crime, such as kidnapping and terrorism.

The approach stands in contrast to that of U.S. agencies, which continue to embrace facial recognition even in light of studies showing the potential for ethnic, racial, and gender bias. A recent report from the U.S. Government Accountability Office found that 10 branches including the Departments of Agriculture, Commerce, Defense, and Homeland Security plan to expand their use of facial recognition between 2020 and 2023 as they implement as many as 17 different facial recognition systems.

Commercial face-analyzing systems have been critiqued by scholars and activists alike throughout the past decade, if not longer. The technology and techniques — everything from sepia-tinged film to low-contrast digital cameras — often favor lighter skin, encoding racial bias in algorithms. Indeed, independent benchmarks of vendors’ systems by the Gender Shades project and others have revealed that facial recognition technologies are susceptible to a range of prejudices exacerbated by misuse in the field. For example, a report from Georgetown Law’s Center on Privacy and Technology details how police feed facial recognition software flawed data, including composite sketches and pictures of celebrities who share physical features with suspects.

Oct 4, 2021

Quenching the world’s thirst with off-grid water desalination

Posted by in categories: security, sustainability

Desalination is the answer to long-term water security, but it’s also expensive and energy-intensive. The good news is that scientists are developing some viable solutions.

The first plant in Europe was built in Spain nearly a half century ago. Since then, facilities have sprung up in water-stressed regions throughout Europe. Just a few years ago, the residents of the small Greek island of Ikaria finally got access to an abundant source of clean drinking water—all thanks to a new desalination plant.

Continue reading “Quenching the world’s thirst with off-grid water desalination” »

Oct 1, 2021

Chinese espionage group deploys new rootkit compatible with Windows 10 systems

Posted by in categories: computing, security

At the SAS 2021 security conference today, analysts from security firm Kaspersky Lab have published details about a new Chinese cyber-espionage group that has been targeting high-profile entities across South East Asia since at least July 2020.

Named GhostEmperor, Kaspersky said the group uses highly sophisticated tools and is often focused on gaining and keeping long-term access to its victims through the use of a powerful rootkit that can even work on the latest versions of Windows 10 operating systems.

“We observed that the underlying actor managed to remain under the radar for months,” Kaspersky researchers explained today.

Sep 22, 2021

The U.S. Is Losing the Global Race to Decide the Future of Money —and It Could Doom the Almighty Dollar

Posted by in categories: cryptocurrencies, economics, security

What must the US do Eric Klien?


Read More: How China’s Digital Currency Could Challenge the Almighty Dollar

China has already largely moved away from coin and paper currency; Chinese consumers have racked up more than $41 trillion in mobile transactions, according to a recent research paper from the Brookings Institution, with the lion’s share (92%) going through digital payment processors WeChat Pay and Alipay.

Continue reading “The U.S. Is Losing the Global Race to Decide the Future of Money —and It Could Doom the Almighty Dollar” »

Sep 20, 2021

AI-powered supply chain visibility platform Altana nabs $15M

Posted by in categories: biotech/medical, robotics/AI, security, sustainability, transportation

Altana AI, a startup building a database for global supply chain networks, today announced that it raised $15 million in a series A funding round led by GV with participation from Floating Point, Ridgeline Partners, Amadeus Capital Partners, and Schematic Ventures. The proceeds, which bring the company’s total raised to $22 million to date, will be used to further develop Altana’s data and AI systems and launch new machine learning and network analysis tools, according to CEO Evan Smith.

Trade wars, the rise of ecommerce, pandemic supply chain shocks, and sustainability concerns are driving fundamental changes to supply chain networks and global trade flows. Nearly 75% of companies report supply chain disruptions in some capacity due to pandemic-related transportation restrictions. And in a recent IBM survey, 40% of executives stressed the need for spare capacity to weather future crises.

Altana’s product aims to solve these challenges with a platform that connects and learns from billions of supply chain data points. It answers questions about products, shipments, companies, and networks, filtering out illicit trade and targeting bad actors and security threats across global commerce networks.

Sep 17, 2021

We created holograms you can touch: You could soon shake a virtual colleague’s hand

Posted by in categories: biotech/medical, education, holograms, security

The TV show “Star Trek: The Next Generation” introduced millions of people to the idea of a holodeck: an immersive, realistic 3D holographic projection of a complete environment that you could interact with and even touch.

In the 21st century, holograms are already being used in a variety of ways such as medical systems, education, art, security and defense. Scientists are still developing ways to use lasers, modern digital processors, and motion-sensing technologies to create several different types of holograms which could change the way we interact.

My colleagues and I working in the University of Glasgow’s bendable electronics and sensing technologies research group have now developed a system of holograms of people using “aerohaptics,” creating feelings of touch with jets of air. Those jets of air deliver a sensation of touch on people’s fingers, hands and wrists.

Page 48 of 128First4546474849505152Last