Showing posts with label Technology. Show all posts
Showing posts with label Technology. Show all posts

Saturday 9 April 2016

Ntel unveils Nigeria first 4G/LTE mobile service

Ntel unveils Nigeria first 4G/LTE mobile service
Ntel, Nigeria’s most advanced 4G/LTE network has announced the commencement of its phased and paced commercial operations with bumper offers for Pioneers and data users.
The first 100,000 to redeem and activate their ntel SIMs will get free on-net calls for life while data subscribers will get 3 months unlimited data usage on select bundles.
In a statement issued by ntel, Kamar Abass, its CEO said “I am delighted to be writing to you, on behalf of the staff and directors of NatCom, with the news that, today, 8 April 2016, we start commercial activities on our newly commissioned 4G/LTE-Advanced network. Our very earliest customers will be able to buy and use these services in clusters, across Lagos and Abuja from sales outlets and agents featuring our bright new brand name: ntel.”
Ntel, Nigeria’s 5th Mobile network operator announced that the commencement of operations is the culmination of their journey from acquiring the old NiTel/MTel assets to the delivery of successive milestones underlining their growing operating capability on their new fixed and mobile network infrastructure.
With the formal commencement, commercial services will be available on ntel’s 4G/LTE-Advanced network across key site clusters in Lagos and Abuja.
Coverage in Port Harcourt will follow during May, along with expanded coverage in Lagos and Abuja, and subsequently to other states, across multiple geo-political zones, during the second half of 2016.
The company said their 4G/LTE-Advanced technology built on the 900/1800MHz spectrum will deliver an unbeatable and game-changing customer experience of high-speed Internet Access up to 230Mbps, the fastest available in Nigeria today thus enabling a world of full mobile broadband experiences that will transform both lives and livelihoods!
“We are passionate at ntel about the power of Broadband to boost productivity and, thereby, transform lives, We expect to see this happen as ntel helps to accelerate the ongoing migration, from existing 2G and 3G services, to genuinely high-speed Mobile Broadband on 4G/LTE-Advanced,” Abass who is a strong advocate of 4G/LTE said.

Friday 1 April 2016

Egypt blocked Facebook internet service over surveillance

Egypt blocked Facebook internet service over surveillance
Egypt blocked Facebook Free Basics Internet service at the end of last year after the U.S. company refused to give the Egyptian government the ability to spy on users, according to sources.
Free Basics, launched in Egypt in October, is aimed at low income customers, allowing anyone with a cheap computer or smartphone to create a Facebook account and access a limited set of Internet services at no charge.
The Egyptian government suspended the service on Dec. 30 and said at the time that the mobile carrier Etisalat had only been granted a temporary permit to offer the service for two months.
Two people in with direct knowledge of discussions between Facebook and the Egyptian government said Free Basics was blocked because the company would not allow the government to circumvent the service’s security to conduct surveillance.
They declined to say exactly what type of access the government had demanded or what practices it wanted Facebook to change.
A spokesman for Facebook declined to comment.
Mohamed Hanafi, a spokesman for Egypt’s Ministry of Communication, declined to comment specifically on the allegation about surveillance demands but cited other reasons for Free Basics to be blocked.
“The service was offered free of charge to the consumer, and the national telecommunication regulator saw the service as harmful to companies and their competitors,” he said.
Free Basics, which is available in 37 countries that have large populations without reliable Internet service, is central to Facebook’s global strategy.
The company does not sell ads on the Free Basics version of its website and app, but it aims to reach a large group of potential users who otherwise would not be able to create Facebook accounts.
Facebook said more than three million Egyptians used the service before it was suspended, and 1 million of them had never had Internet access.
The main Facebook site and app are still available in Egypt, which has a population of about 90 million.
The conflict over Free Basics highlights the delicate balancing act that global Internet companies face in responding to the demands of governments while protecting the privacy of their customers, especially at a time of heightened concerns about Internet surveillance and censorship worldwide.
It represents one of the few known cases in which a global Internet company has received and rejected a government demand for special access to its network and been forced to shut down a service, Internet privacy experts say.
Free Basics has come under fire from Internet activists across the globe, most notably in India, for violating net neutrality by allowing free access to a select group of websites and businesses, thus putting others at a disadvantage.
Indian regulators issued new rules in February that effectively barred Free Basics after a two-month public consultation process.
Hanafi cited the India example in explaining Egypt’s move, but there has been no public debate or regulatory proceeding over net neutrality or the competitive impact of Free Basics in Egypt.

Wednesday 30 March 2016

Can we replace politicians with robots?

Frank Mols, The University of Queensland and Jonathan Roberts, Queensland University of Technology

If you had the opportunity to vote for a politician you totally trusted, who you were sure had no hidden agendas and who would truly represent the electorate’s views, you would, right?
What if that politician was a robot? Not a human with a robotic personality but a real artificially intelligent robot.
Futures like this have been the stuff of science fiction for decades. But can it be done? And, if so, should we pursue this?

Lost trust

Recent opinion polls show that trust in politicians has declined rapidly in Western societies and voters increasingly use elections to cast a protest vote.
This is not to say that people have lost interest in politics and policy-making. On the contrary, there is evidence of growing engagement in non-traditional politics, suggesting people remain politically engaged but have lost faith in traditional party politics.
More specifically, voters increasingly feel the established political parties are too similar and that politicians are preoccupied with point-scoring and politicking. Disgruntled voters typically feel the big parties are beholden to powerful vested interests, are in cahoots with big business or trade unions, and hence their vote will not make any difference.
Another symptom of changing political engagement (rather than disengagement) is the rise of populist parties with a radical anti-establishment agenda and growing interest in conspiracy theories, theories which confirm people’s hunch that the system is rigged.
The idea of self-serving politicians and civil-servants is not new. This cynical view has been popularised by television series such as the BBC’s Yes Minister and the more recent US series House of Cards (and the original BBC series).
We may have lost faith in traditional politics but what alternatives do we have? Can we replace politicians with something better?

Machine thinking

One alternative is to design policy-making systems in such a way that policy-makers are sheltered from undue outside influence. In so doing, so the argument goes, a space will be created within which objective scientific evidence, rather than vested interests, can inform policy-making.
At first glance this seems worth aspiring to. But what of the many policy issues over which political opinion remains deeply divided, such as climate change, same sex marriage or asylum policy?
Policy-making is and will remain inherently political and policies are at best evidence-informed rather than evidence-based. But can some issues be depoliticised and should we consider deploying robots to perform this task?
Those focusing on technological advances may be inclined to answer “yes”. After all, complex calculations that would have taken years to complete by hand can now be solved in seconds using the latest advances in information technology.
Such innovations have proven extremely valuable in certain policy areas. For example, urban planners examining the feasibility of new infrastructure projects now use powerful traffic modelling software to predict future traffic flows.
Those focusing on social and ethical aspects, on the other hand, will have reservations. Technological advances are of limited use in policy issues involving competing beliefs and value judgements.
A fitting example would be euthanasia legislation, which is inherently bound up religious beliefs and questions about self-determination. We may be inclined to dismiss the issue as exceptional, but this would be to overlook that most policy issues involve competing beliefs and value judgements, and from that perspective robot politicians are of little use.

Moral codes

A supercomputer may be able to make accurate predictions of numbers of road users on a proposed ring road. But what would this supercomputer do when faced with a moral dilemma?
Most people will agree that it is our ability to make value judgements that sets us apart from machines and makes us superior. But what if we could program agreed ethical standards into computers and have them take decisions on the basis of predefined normative guidelines and the consequences arising from these choices?
If that were possible, and some believe it is, could we replace our fallible politicians with infallible artificially intelligent robots after all?
The idea may sound far-fetched, but is it?
Robots may well become part of everyday life sooner than we think. For example, robots may soon be used to perform routine tasks in aged-care facilities, to keep elderly or disabled people company and some have suggested robots could be used in prostitution. Whatever opinion we may have about robot politicians, the groundwork for this is already being laid.
A recent paper showcased a system that automatically writes political speeches. Some of these speeches are believable and it would be hard for most of us to tell if a human or machine had written them.
Politicians already use human speech writers so it may only be a small step for them to start using a robot speech writer instead.
The same applies to policy-makers responsible for, say, urban planning or flood mitigation, who make use of sophisticated modelling software. We may soon be able to take out humans altogether and replace them with robots with the modelling software built into itself.
We could think up many more scenarios, but the underlying issue will remain the same: the robot would need to be programmed with an agreed set of ethical standards allowing it to make judgements on the basis of agreed morals.

The human input

So even if we had a parliament full of robots, we would still need an agency staffed by humans charged with defining the ethical standards to be programmed into the robots.
And who gets to decide on those ethical standards? Well we’d probably have to put that to the vote between various interested and competing parties.
This bring us full circle, back to the problem of how to prevent undue influence.
Advocates of deliberative democracy, who believe democracy should be more than the occasional stroll to a polling booth, will shudder at the prospect of robot politicians.
But free market advocates, who are more interested in lean government, austerity measures and cutting red-tape, may be more inclined to give it a go.
The latter appear to have gained the upper hand, so the next time you hear a commentator refer to a politician as being robotic, remember that maybe one day some of them really will be robots!
The Conversation

Frank Mols, Lecturer in Political Science, The University of Queensland and Jonathan Roberts, Professor in Robotics, Queensland University of Technology
This article was originally published on The Conversation. Read the original article.

Nigeria to become W’Africa’s Internet transmission hub

Nigeria to become W’Africa’s Internet transmission hub
Indications emerged yesterday that Nigeria could well become West Africa’s Internet transmission hub.
This is because the Internet Exchange Point of Nigeria (IXPN), the country’s Internet gateway, has achieved a major milestone by its elevation to the status of the West African regional Internet Exchange Point.
Confirming this development yesterday, the Managing Director/Chief Executive Officer of IXPN, Muhammed Rudman, disclosed that the huge stride was made by successfully vying in the Africa Union Commission (AUC)’s African Internet Exchange System (AXIS) project for a Regional Internet Exchange Point (RIXP) for West Africa.
Already, Rudman, who is very optimistic about the huge revenue generation that would accrue to Nigeria immediately other service providers in the region are connected to the country’s exchange point, disclosed that currently the IXP saves Nigerian telecom operators and Internet Service Providers (ISPs) about $1 million monthly because they now route traffic locally instead of hosting them abroad.
The country currently has three IXPs, situated in Lagos, Port Harcourt and Abuja.
It was learnt that while there are plans by the Federal Government to commission two new ones in Kano and Enugu soon, the established ones cost as much as N35 million each.
A reliable source in the industry said that prior to now, some ISPs in the country still depended on Internet hubs located outside the country, in places like the United States (U.S), Israel and some parts of Europe.
According to him, this meant that Internet traffic from Nigeria went directly to the foreign hubs thereby causing serious capital flight in the form of transit charges paid to foreign ISPs by some of their Nigerian counterparts.
But according to Rudman, that has changed as more operators including Google, now route traffic locally in Nigeria.
He explained that before now, ISPs paid as much as $4000 per megabyte to foreign hubs to route Internet traffic, “but because they have now found the IXPN more reliable and dependable, they route traffic within and pay an average of $100 per megabyte.
This has equally come because of the new telecoms infrastructure in the country, including the submarine cable systems and data centres that are now domiciled in Nigeria.”
Meanwhile, until the recent development, the IXPN, a core network infrastructure provider company that allows several ISPs, telecommunications companies, carriers, and content providers, to exchange traffic among their networks locally, was primarily focused on localising Internet traffic in Nigeria by interconnecting Nigerian networks.
Giving more insight into its new status, Rudman said that IXPN had moved from national to a regional level. He stressed that its infrastructure would be upgraded, in consonance with its new rules to ensure a more resilient operation in the function of connecting all other Internet Exchange Points in the region and to accentuate its capacity to handle the traffic coming thereby.
Rudman said: “The fact that the regional IXP for West Africa is domiciled in Nigeria should leap-frog the nation to the information hub in the West African sub-region. It will, invariably, boost patronage of complementary and ancillary services in Nigeria from telecom companies, content providers and other IP-centric organisations in the region.
“Becoming the regional IXP holds great prospects for the Nigeria economy. Typically, if the big telecommunications operators and ISPs across the region connect to us, it will make the country the main hub for information communication exchange within the region, which would eventually attract regional and global content providers into the country, and thus translating to more patronage for our data centers.”
According to him, if Nigeria becomes the hub in the region, its multiplier effect will mean submarine cables systems in the country will sell more capacity the data centre in the country will have more patronage from the West Africa region, as major ICT companies within the region will begin to host their information in Nigeria locally, with more interconnection of the service provider.
The CEO stressed that regional IXP would attract banks, universities and research institutions in West Africa to host their information in Nigeria because of the shorter physical distance between these countries to Nigeria compared to Europe and the United States where they currently host their data.
He did not fail to declare his optimism about the attraction it would hold for many global content providers such as Google, Yahoo and Microsoft for whom the task of integrating their network would be made much easier because they would prefer a place where several service providers are interconnected.
Thus, he projected that they would be in favour of making Nigeria their regional hub, a point from where they can distribute their content to the West African region.
Rudman reaffirmed that the IXPN, a not-for-profit organisation, and the first and only neutral IXP in Nigeria, would remain committed to its objective of providing a core national Internet infrastructure that facilitates Internet operation in Nigeria, and to localising traffic as well as reducing the routing cost of local Internet; and would therefore, continue to offer subsidised services to all its members.
He disclosed that some of the critical Internet infrastructure managed by IXPN include some Root servers, the Time server for Nigeria, the Measurement-Lab Network – a Diagnostic Tool which employs a combination of variables to analyse the performance of ISPs and enhance Internet transparency while helping to sustain a healthy, innovative Internet.

Snapchat redesigns chat to add stickers, audio, and video notes

TheVerge
Snapchat is releasing a major update today that bolsters its chat function with a variety of new multimedia features. The long-rumored update adds more than 200 stickers featuring walruses, sloths, aliens, and Snapchat's signature ghost, and they can be searched by keyword, as on Facebook Messenger. There are also easier controls for starting a video call, allowing you to dial someone who is not present in the chat. You can also choose to chat via audio, and switch back and forth from audio to video during a chat. And if your friend doesn't pick up, or you just want to send them a reaction using other means, you can record a short audio or video "note" and it will be waiting for them the next time they open the app.
The new chat feature also lets you access your camera roll from the messaging screen for the first time. Tap the familiar photo icon and you can choose to send photos and videos to your friends using chat. You can also access them during video chats, so you can share photos inside the chat even as you talk. (They pop up as large thumbnails on the left side of the screen; when your call ends you'll find them waiting for you in chat to look at in full resolution.) This feature is unique to the major video chatting services, and helps to answer the question of why you might want to use Snapchat's video calling feature over FaceTime, Hangouts, Facebook Messenger, or Skype.
Snapchat introduced chat in May 2014, allowing users to communicate via text and video chat for the first time. Video chat worked only when both users were present in the chat, and would end if you removed your finger from the screen. (I'm told you could "lock" the video and regain the use of your hand, but I never figured out how.) Since then, other popular messaging clients have continued to add features. Facebook split off Messenger into its own app and added video calling, stickers, and GIF search. WhatsApp added a feature for letting you share documents. iMessage added "tap to talk" for sending audio recordings.
snapchat
Snapchat is usually content to chart its own path, but it's not immune to competitive pressures. The company says it has 100 million daily users; WhatsApp and Facebook Messenger draw 900 million and 800 million a month, respectively. (Snapchat has more monthly users than daily users, but hasn't disclosed the number recently.) And while the company's unique approach to messaging has made it tremendously popular with younger audiences, it can also make the app feel forbidding for newcomers. (There's something of a cottage industry in explaining how Snapchat works.)
The new chat interface is more familiar — and more accessible. It introduces media seen elsewhere, like stickers, but integrates them in its own unique way. (Send a bunch of stickers to someone and they appear side by side, like words in a sentence.) The company says that the new chat is designed to put every form of input on equal footing, encouraging users to choose whichever one feels natural in the moment. I expect people will get creative with the new tools: video notes in particular, with their 10-second time limit, seem ripe for experimentation.
There are some other nice touches in the redesign. Each chat will show you your most-used stickers for that conversation, making the app feel more personalized. The presence indicator inside chat, which was previously a somewhat ominous pulsating blue square with a white circle inside, has shrunk down to a smiley face that appears when your friend joins. (It then shrinks down further, into a blue dot.) And you can send photos and videos from your camera roll in batches, the kind of power-user feature that makes Snapchat feel more like a grown-up messaging client.
The update also includes a significant change to the Stories feature, which broadcasts your friends' public snaps for 24 hours after they're posted. Once you've finished watching a story, Snapchat will automatically advance to the next story in your feed. And if you tire of watching one friend's story, you can now swipe left to see the next story down. (Previously you had to swipe down and then select the next story manually.) The result is an app that now feels a bit closer to television — a "lean-back" experience that encourages you to consume your feed as a single product, rather than as a collection of moments.
In a brief demonstration, the new chat interface looked as fast as ever, but felt just a bit more fun. The update is rolling out today on iOS and Android.

Tuesday 29 March 2016

Apple responds to the FBI hacking the San Bernardino shooter's iPhone

Earlier today, the FBI announced that they were able to extract the data that they needed from the iPhone 5c that was used by the San Bernardino shooter, Syed Rizwan Farook. The long and gruesome battle between Apple and law enforcement was now over.
Apple responded with the following statement:
From the beginning, we objected to the FBI's demand that Apple build a backdoor into the iPhone because we believed it was wrong and would set a dangerous precedent. As a result of the government's dismissal, neither of these occurred. This case should never have been brought.
We will continue to help law enforcement with their investigations, as we have done all along, and we will continue to increase the security of our products as the threats and attacks on our data become more frequent and more sophisticated.
Apple believes deeply that people in the United States and around the world deserve data protection, security and privacy. Sacrificing one for the other only puts people and countries at greater risk.
This case raised issues which deserve a national conversation about our civil liberties, and our collective security and privacy. Apple remains committed to participating in that discussion.
It's unclear what the future holds at this point. As Apple said in its statement, they will continue to increase the security of its products as threats and attacks become more sophisticated. If they choose to patch the flaw that law enforcement used, this whole mess could start up all over again.

Justice Dept. withdraws legal action against Apple over San Bernardino iPhone

The Justice Department withdrew its legal action against Apple, Monday, confirming that an outside method to bypass the locking function of a San Bernardino terrorist’s phone has proved successful.
The method brought to the FBI earlier this month by an unidentified entity allows investigators to crack the security function without erasing contents of the iPhone used by Syed Farook, who with his wife, Tashfeen Malik, carried out the December mass shooting that left 14 dead.
"The government has now successfully accessed the data stored on Farook's iPhone and therefore no longer requires the assistance from Apple Inc.,'' Justice lawyers said in a two-page filing in a California federal magistrate's court.
Justice spokeswoman Melanie Newman said the FBI is reviewing the contents of the phone, "consistent with standard investigatory procedures.''
"We will continue to pursue all available options for this mission, including seeking the cooperation of manufacturers and relying upon the creativity of both the public and private sectors,” Newman said.
Apple had no immediate comment.
Justice officials declined to comment on whether the technique used to unlock the phone would be applied to other encrypted devices. Authorities also refused comment on whether the method would be shared with Apple.
Monday's action culminates six weeks of building tensions. The FBI insisted for weeks that only Apple could crack the contents of Farook's iPhone. Apple said such an action amounted to a digital "backdoor" that could eventually undermine the privacy of consumers — an unwavering stance supported by Google, Facebook, Microsoft and other tech giants.
Since a federal magistrate in California in mid-February ordered Apple to assist the FBI in gaining access to Farook's seized iPhone, the legal filings and rhetoric between the world’s most valuable technology company and the federal government's premier law enforcement agency had sharpened into verbal vitriol. The foes were poised to face off in a court room in Riverside, Calif., last week before the Justice Department abruptly asked for — and was granted — a postponement.
Apple CEO Tim Cook has called the request to override the passcode encryption akin to creating a "backdoor" into the iPhone, and crusaded in a highly coordinated public campaign against the dangers of weakened security in digital devices. This month, Apple said the “Founding Fathers would be appalled” because the government’s order to unlock the iPhone was based on what it said was non-existent authority asserted by the DOJ.
The tech industry has stood behind Apple, which in court documents said the government's order was "neither grounded in the common law nor authorized by statute."
Alex Abdo, staff attorney for the American Civil Liberties Union, called the government’s “unprecedented power-grab” a threat to everyone’s security and privacy.
“Unfortunately, (Monday's) news appears to be just a delay of an inevitable fight over whether the FBI can force Apple to undermine the security of its own products,” Abdo said in a statement late Monday. “We would all be more secure if the government ended this reckless effort.”
Government law enforcement officials have denied charges the FBI wanted to establish a backdoor to Apple's encryption, and swatted away accusations that they were using the case to gain broader access to consumers' devices.
"The San Bernardino case was not about trying to send a message or set a precedent; it was and is about fully investigating a terrorist attack,'' FBI Director James Comey wrote in an editorial last week.
California U.S. Attorney Eileen Decker said federal authorities had pursued the litigation to “fulfill a solemn commitment to the victims of the San Bernardino shooting — that we will not rest until we have fully pursued every investigative lead related to the vicious attack.’’

Saturday 26 March 2016

Big data security problems threaten consumers' privacy

Who has your personal data, and how secure is it? Do you even know?Card and lock image from shutterstock.com
Jungwoo Ryoo, Pennsylvania State University
As more personal information is collected up by ever-more-powerful computers, giant sets of data – big data – have become available for not only legitimate uses but also abuses.
Big data has an enormous potential to revolutionize our lives with its predictive power. Imagine a future in which you know what your weather will be like with 95 percent accuracy 48 hours ahead of time. But due to the possibility of malicious use, there are both security and privacy threats of big data you should be concerned about, especially as you spend more time on the Internet.
What threats are emerging? How should we address these growing concerns without denying society the benefits big data can bring?

The size of the potential problem

First of all, due to the sheer scale of people involved in big data security incidents, the stakes are higher than ever. When the professional development system at Arkansas University was breached in 2014, just 50,000 people were affected. That’s a large number, but compare it with 145 million people whose birth dates, home and email addresses, and other information were stolen in a data breach at eBay that same year.
From the perspective of a security professional, protecting big data sets is also more daunting. This is partly due to the nature of the underlying technologies used to store and process the information.
Big data companies like Amazon heavily rely on distributed computing, which typically involves data centers geographically dispersed across the whole world. Amazon divides its global operations into 12 regions each containing multiple data centers and being potentially subject to both physical attacks and persistent cyberattacks against the tens of thousands of individual servers housed inside.

Difficulties with access control

One of the best strategies for controlling access to information or physical space is having a single access point, which is much easier to secure than hundreds of them. The fact that big data is stored in such widely spread places runs against this principle. Its vulnerability is far higher because of its size, distribution and broad range of access.
In addition, many sophisticated software components do not take security seriously enough, including parts of companies' big data infrastructure. This opens a further avenue of potential attack.
For instance, Hadoop is a collection of software components that allows programmers to process a large amount of data in a distributed computing infrastructure. When first introduced, Hadoop had very basic security features suitable for a system used by only a few users. Many big companies have adopted Hadoop as their corporate data platform, despite the fact that its access control mechanism wasn’t designed for large-scale adoption.

Consumer demand drives security and privacy

For consumers, then, it is critical to demand a heightened level of security through vehicles such as terms and conditions, service level agreements, and security trust seals from organizations collecting and using big data.
What can companies do to protect personal information? Countermeasures such as encryption, access control, intrusion detection, backups, auditing and corporate procedures can prevent data from being breached and falling into the wrong hands. As such, security can promote your privacy.
At the same time, heightened security can also hurt your privacy: it can provide legitimate excuses to collect more private information such as employees' web surfing history on work computers.
When law enforcement agencies collect information in the name of improved security, everyone is treated as a potential criminal or terrorist, whose information may eventually be used against them. The authorities already know a lot about us but could ask companies such as Apple, Google and Amazon to provide more intelligence such as a decrypted version of our data, what search terms we are using and what we are buying online.
The fundamental security principle used to justify this type of blanket surveillance (which is now more affordable and feasible due to the use of big data technologies) is “nobody can be trusted.” Once collected, those data join the rest of the information in being susceptible to abuse and breaches, as demonstrated in snooping incidents involving National Security Agency employees.
And yet when used properly, big data can help enhance your privacy by allowing more information to be leveraged and eventually improve the quality (especially, the accuracy) of intelligence on potential attacks and attackers in cyberspace.
For example, in an ideal world we don’t have to worry about fraudulent emails (also called phishing) because a big data analytics engine would be able to pick out malicious emails with pinpoint accuracy.

How big data is used – for you or against you

There are also other privacy concerns about big data. Companies are eager to deliver targeted advertising to you and tracking your every online move. Big data makes this tracking easier to do, less expensive and more easily analyzed.
A service like IBM’s Personality Insights can build a detailed profile of you, moving well beyond basic demographics or location information. Your online habits can reveal aspects of your personality, such as whether you are outgoing, environmentally conscious, politically conservative or enjoy travel in Africa.
Industry representatives make benign claims about this capability, saying it improves users' online experiences. But it is not hard to imagine that the same information could be very easily used against us.
For example, insurance companies could start questioning coverage to consumers based on these sorts of big-data profiles, which has already begun to happen.
Banning large-scale data collection is unlikely to be a realistic option to solve the problem. Whether we like it or not, the age of big data has already arrived. We should find the best way of protecting our privacy while allowing legitimate uses of big data, which can make our lives much safer, richer and more productive.
For example, when used legitimately and securely, big data technology can drastically improve the effectiveness of fraud detection, which, in turn, frees us from worrying about stolen identities and potential monetary loss.
Transparency is the key to letting us harness the power of big data while addressing its security and privacy challenges. Handlers of big data should disclose information on what they gather and for what purposes.
In addition, consumers must know how the data is stored, who has access to it and how that access is granted. Finally, big data companies can earn public trust by giving specific explanations about the security controls they use to protect the data they manage.
The Conversation
Jungwoo Ryoo, Associate Professor of Information Sciences and Technology at Altoona campus, Pennsylvania State University
This article was originally published on The Conversation. Read the original article.

Eye in the Sky movie gives a real insight into the future of warfare

EYE IN THE SKY
An eye in the sky from the movie of the same name – the reality of drone warfare. Entertainment One
Toby Walsh, Data61
Eye in the Sky is a tight British thriller staring Helen Mirren, Breaking Bad’s Aaron Paul and the late and already missed Alan Rickman. That should be enough to know to get you down to the cinema to see this recently released movie.
The movie is a surprisingly cerebral look at the future of war. The enemy are Islamic terrorists hiding in plain sight in East Africa. The “eye in the sky” of the title is a Predator drone loitering at 25,000ft ready to rain death down onto the population below with its aptly named Hellfire missiles.
The director Gavid Hood (Tsotsi, Wolverine) doesn’t take sides. Other than the obligatory pot shots at some gung ho Yanks and ineffectual Brits.
The movie features some amazing but very real technology coming to the battlefield soon. A miniature surveillance drone the size of an insect. Surveillance software that recognises ear prints. And another drone that looks and flies like a humming bird.
But it doesn’t hold back on the moral and ethical dilemmas of future warfare. Indeed, very slight spoiler alert, the whole movie can be seen as an extended debate on a famous problem in ethics, the Trolley Problem.

Lieutenant General Frank Benson (Alan Rickman) in a scene from Eye in the Sky. Entertainment One

Ethical dilemmas

There are a number of different formulations of the Trolley Problem. In fact, how people perceive the ethics of the Trolley Problem depend on how it is formulated.
The basic setup is a runaway trolley careering down a track. There are five people tied to the track. They are sure to die unless you throw a lever and direct the trolley onto a siding. But here’s the ethical kicker, this will kill one person tied to the track in the siding. What do you do?
One variant removes the siding and replaces it with a fat man, standing next to you on a bridge over the track. You can push the fat man off the bridge and thereby stop the trolley. Do you push him off or not?
The movie plays with this problem, changing the setting several times, and testing our response to these changes.
Behind this are some even more topical ethical problems.

Killer robots

Earlier this week, the the UK’s Royal Navy announced it will run the first robot war games in October this year.
It is clear from news stories like this that the military in the UK, US, China and elsewhere are rushing to take advantage of what has been called the third revolution in warfare – lethal autonomous weapons – or as the media often call them, killer robots.
In the movie Eye in the Sky, the actors struggle to make ethical decisions with technology that is increasingly autonomous. Taking a line out of the movie, the decision making does not reduce itself to simply adding up numbers. There are many, often conflicting dimensions: ethical, legal, military, and political.

Humans in the loop

Ultimately, in the movie, a human “in the loop” still has to make the final life or death decision.

Colonel Katherine Powell (Helen Mirren) in a scene from Eye in the Sky Entertainment One

But what happens when, as is likely in the near future, there is no human any more in the loop? It is very likely that robots will be making simplistic and erroneous decisions.
It was for these sort of reasons that I, and thousands of my colleagues working in Artificial Intelligence (AI) and Robotics, signed an open letter calling for offensive autonomous weapons to be banned.
And it is for these sort of reasons that I will be going to the UN in Geneva next month to talk to diplomats at the Convention on Certain Conventional Weapons to persuade them to push forwards with their discussions on a ban.
There is only a small window of opportunity to get a ban in place before this moves from the big screen and comes to the conflict zones of our world.
As demonstrated by the Drone Papers, secret documents that it’s claimed offer an “unprecedented glimpse into Obama’s drone wars”, the technology will deceive us into thinking we can fight clean, clinical wars. But in reality, nine out of ten people being killed will not be the intended targets.
Just as in this movie, there will lots of collateral damage, women, children and other people who just happen to be in the wrong place.
As with other technologies that have been successfully banned, like blinding lasers and anti-personnel mines, we get to choose if killer robots are part of our future of not.
Let’s make the right choice.


The Conversation
Toby Walsh, Professor of AI at UNSW, Research Group Leader at Data61, Data61
This article was originally published on The Conversation. Read the original article.

HACKERS CAN BREAK INTO YOUR PC THROUGH YOUR WIRELESS MOUSE FOR LESS THAN $20

325_Mice
Wireless mouse are vulnerable to hacks, according to a report from a cybersecurity startup.
From public Wifis to smart gadgets, the list of hackable things seems infinite nowadays. But San Francisco-based cybersecurity researchers found even wireless mice—the innocuous must-have gadgets sidekicked to every computer—are vulnerable to hacks .
Two researchers at Bastille, a cybersecurity startup, discovered that the millions of wireless mice use unencrypted signals to connect with the computer . A hacker can build a tool for less than $20 using an antenna, a wireless chip called a dongle and some simple lines of code to trick the wireless chip connected to the target computer into accepting it as a mouse.
Once broken in, the hacker can use the dongle to pretend to be a keyboard. “This would be the same as if the attacker was sitting at your computer typing on the computer,” says Bastille’s Marc Newlin. “The attacker can send data to the dongle, pretend it's a mouse but say 'actually I am a keyboard and please type these letters.’”
The vulnerable wireless mice spans most of the major manufacturers of the product, from Logitech, Dell and Microsoft. But Bluetooth-enabled mice are not affected. The hackers can use the strength of the wireless signal of the mouse—which can be as far as 180 feet—to crack into the computer in less than a minute.
Bastille recommends installing any updates before continuing to use the affected mouse or keyboard, if the devices come with available firmware updates. But considering most major brand wireless mice companies do not have updates, the only hope is to simply stop using the wireless mice. “There is no mechanism to secure a vulnerable device short of unplugging the USB dongle from the computer,” reads the report on Bastille’s website.
Bastille founder Chris Rouland tells Reuters that the wireless mice vulnerability only shows that companies—no matter how encrypted they may be in their servers—are still open to hacks through the simplest means. "No one was looking at the air space,” says Rouland. “So I wanted to build this cyber x-ray vision to be able to see what was inside a corporation's air space versus what was just plugged into the wired network or what was on a Wifi hotspot.”

Belgium Fears Nuclear Plants Are Vulnerable

THE NEW YORK TIMES


nuclear plant
The nuclear power plant in Doel, Belgium. The country has a troubled history of security lapses at its nuclear power facilities. CreditJulien Warnand/European Pressphoto Agency
BRUSSELS — As a dragnet aimed at Islamic State operatives spiraled across Brussels and into at least five European countries on Friday, the authorities were also focusing on a narrower but increasingly alarming threat: the vulnerability of Belgium’s nuclear power plants.
The investigation into this week’s deadly terror attacks in Brussels has raised fresh alarm that the Islamic State was seeking to attack, infiltrate, sabotage or obtain nuclear or radioactive material in a country with an already troubled history of security lapses at its nuclear facilities, a weak intelligence apparatus, and a deeply rooted terrorist network.
On Friday, the authorities stripped security badges from several workers at one of two plants where all nonessential employees were sent home hours after the attacks at the Brussels airport and one of the city’s busiest subway stations three days before. Surveillance footage of a top official at another Belgian nuclear facility was discovered last year in the apartment of a suspected militant linked to the suicide bombers who unleashed the horror here in Brussels, as well as those who carried out the massacre that killed 130 people in Paris in November.
Asked on Thursday at a London think tank whether there was a danger of the Islamic State’s obtaining a nuclear weapon, the British defense secretary, Michael Fallon, said that “was a new and emerging threat.”
While the prospect that terrorists can obtain enough highly enriched uranium and then turn it into a nuclear fission bomb seems far-fetched to many experts, they say the fabrication of some kind of dirty bomb from radioactive waste is more conceivable. There are a variety of other risks involving Belgium’s facilities, including that terrorists somehow shut down the privately operated plants, which provide nearly half of Belgium’s power.
The fears at the nuclear power plants are of “an accident in which someone explodes a bomb inside the plant,” said Sébastien Berg, the spokesman for Belgium’s nuclear energy agency. “The other danger is that they fly something into the plant from outside.” That could stop the cooling process of the used fuel, Mr. Berg explained, and in turn shut down the plant.
The revelation of the surveillance footage was the first evidence that the Islamic State has a focused interest in nuclear material. But Belgium’s facilities have had a worrying track record of breaches, prompting warnings from Washington and other foreign capitals.
Some of these are relatively minor: The Belgiun nuclear agency’s computer system was hacked this year and shut down briefly. In 2013, two individuals managed to scale the fence at Belgium’s research reactor in the city of Mol, break into a laboratory and steal equipment.
Other are far more disconcerting.
Back in 2012, two employees at the nuclear plant in Doel quit to join jihadists fighting in Syria, and eventually transferred their allegiances to the Islamic State. Both men fought in a brigade that counted dozens of Belgians in its ranks, including Abdelhamid Abaaoud, considered the architect of the Paris attacks.
One of these men is believed to have died fighting in Syria, but the other was convicted of terror-related offenses in Belgium in 2014, and released from prison last year. It is not known whether they communicated information about their former workplace to their comrades in the Islamic State.
At the same plant where these jihadists once worked, an individual who has yet to be identified walked into the humming reactor No. 4 in 2014, turned a valve, and drained 65,000 liters of oil used to lubricate the turbines. The ensuing friction nearly overheated the machinery, forcing it to be immediately shut down. The damage was so severe that the reactor was out of commission for five months.
Investigators are now looking into possible links between that case and terror groups, although they caution that it could also have been the work of an insider with a workplace grudge. What is clear is that the act was meant to sow dangerous havoc — and that the plant’s security systems can be breached.
“This was a deliberate act to take down the nuclear reactor, and a very good way to do it,” Mr. Berg, the nuclear agency spokesman, said of the episode in a recent interview.
These incidents are now all being seen in a new light, as information gathered by investigators since Tuesday’s attacks suggest that the same terrorist network that hit Paris and Brussels was in the planning stages of some kind of operation at a Belgian nuclear facility.
Three men linked to the surveillance video were involved in either the Paris or Brussels attacks.
Ibrahim and Khalid el-Bakraoui, the brothers who the authorities say acted as suicide bombers at the Brussels airport and subway station, are believed to have driven to the surveilled scientist’s home and removed a camera that was hidden in nearby bushes. The authorities say they then brought it to the home of Mohammed Bakkali, a relatively unknown figure who was arrested by the Belgian police after the Paris attacks and is accused of helping with logistics and planning.
Belgium has both low enriched uranium, which fuels its two power plants, and highly enriched uranium, which is used in its research reactor primarily to make medical isotopes, plus the byproducts of that process. The United States provides Belgium with highly enriched uranium — making it particularly concerned about radioactive materials landing in terrorist hands — and then buys isotopes.
Experts say the most remote of the potential nuclear-related risks is that Islamic State operatives would be able to obtain highly enriched uranium. Even the danger of a dirty bomb is limited, they said, because much radioactive waste is so toxic it would likely sicken or kill the people trying to steal it.
Cheryl Rofer, a retired nuclear scientist at the Los Alamos National Laboratory and editor of the blog Nuclear Diner, said Belgium’s Tihange nuclear plant has pressurized water reactors, inside a heavy steel vessel, reducing the danger that nuclear fuel could leak or spread. She said the Brussels bombers’ explosive of choice, TATP, might be able to damage the reactor but that the most likely outcome would be a meltdown that would turn off the reactor, limiting the radiation damage.
And if terrorists did manage to shut down the reactor, reach the fuel rods, and get the fuel out of them, Ms. Rofer said, it would be “too radioactive to go near, it would kill you right away.
While nuclear experts are doubtful that terrorists could steal the highly enriched uranium at the Mol reactor without alerting law enforcement, some do believe they could recruit people who know how to fashion a nuclear device.
Matthew Bunn, a specialist in nuclear security at Harvard’s John F. Kennedy School of Government, said another worry is the byproducts of the isotopes made at Mol, such as Cesium-137.
“It’s like talcum powder,” he said. “If you made a dirty bomb out of it, it’s going to provoke fear, you would have to evacuate and you have to spend a lot of money cleaning it up; the economic destruction cost could be very high.”
The discovery of the surveillance video in November set off alarm bells across the small nuclear-security community, with fresh worries that terror groups could kidnap, extort or otherwise coerce a nuclear scientist into helping them. The official who was watched works at Mol, one of five research reactors worldwide that produce 90 percent of the isotopes used for medical diagnosis and treatment.
Professor Bunn of Harvard noted that the Islamic State “has an apocalyptic ideology and believes there is going to be a final war with the United States,” expects to win that war, and “ would need very powerful weapons to do so.”
“And if they ever did turn to nuclear weapons,” he added, “they have more people, more money and more territory under their control and more ability to recruit experts globally than Al Qaeda at its best ever had.”

Friday 25 March 2016

US indicts seven Iranians with hacking American banks

hackers
The United States has indicted seven Iranians working for two private computer companies on charges of hacking nearly 50 financial institutions and companies in America over nearly two years, prosecutors announced Thursday.
The hack attacks began in The United States has indicted seven Iranians working for two private computer companies on charges of hacking nearly 50 financial institutions and companies in America over nearly two years, prosecutors announced Thursday.
The hack attacks began in December 2011 and escalated in September 2012, then occurring on a near weekly basis until May 2013, the indictment said. Bank of America, J.P. Morgan Chase, Citibank and HSBC were among those affected, it added.
December 2011 and escalated in September 2012, then occurring on a near weekly basis until May 2013, the indictment said. Bank of America, J.P. Morgan Chase, Citibank and HSBC were among those affected, it added.

Uber sues OlaCabs over 90000 fake accounts

Uber is suing Indian competitor Ola, alleging it created more than 90,000 fake accounts to interfere with its business and frustrate its drivers.
The US company claims the fake accounts were used to make over 400,000 false bookings that ended up cancelled.
It filed a lawsuit in the High Court of Delhi this month requesting an injunction against Ola and $7.4m (£5.2m) in damages.
OlaCabs has denied the accusations, calling them “frivolous and false”.
“It is not beyond our imagination that this is an effort to divert attention from the current realities of the market where Uber has faced major setbacks,” the company said in a statement.
Uber, considered the world’s most valuable start-up, refused to comment beyond their legal petition.
The battle for India’s transport market has heated up in recent months, with Uber investing $1bn over the past nine months.
Ola, which is backed by Japan’s SoftBank Group and hedge fund Tiger Global Management, is part of an alliance aimed at trying to reduce Uber’s market dominance.
The other members include San Francisco’s Lyft, Southeast Asian competitor Grab and China’s Didi Kuaidi.
A hearing on Uber’s Indian petition has been set for 14 September.

Thursday 24 March 2016

From Stonehenge to Nefertiti: how high-tech archaeology is transforming our view of history

TOMB

Kristian Strutt, University of Southampton

A recent discovery could radically change our views of one of the world’s most famous archaeological sites, Tutankhamun’s tomb. Scans of the complex in Egypt’s Valley of the Kings revealed it may still include undiscovered chambers – perhaps even the resting place of Queen Nefertiti – even though we have been studying the tomb for almost 100 years.
It’s common to get excited about high-profile archaeological discoveries, but it’s the slower, ongoing research that shows the real potential of new technology to change our understanding of history.
The latest findings touch on the mystery and conjecture around the tomb of the Egyptian queen consort Nefertiti, who died around 1330 BC. Some scholars believe that she was buried in a chamber in her stepson Tutankhamun’s tomb (known as KV62), although others have urged caution over this hypothesis.
Nefertiti is a pivotal figure in Egyptology. She and her husband Pharaoh Akhenaten helped bring about a religious revolution in ancient Egypt, and she may have even briefly ruled the country after his death. But we have little solid information about her life or death and her remains have never been found.
So the discovery of her tomb could be instrumental in revealing more about this critical period in history, and even change our views on how powerful and important she was. Nicholas Reeves, the director of the research, believes that the size and layout of KV62 means that it may have originally been designed for a queen. He has also used a ground-penetrating radar (GPR) survey to look for possible hidden antechambers that may contain Nefertiti’s remains after reassessment of the relationship between Nefertiti and Tutankhamun led to renewed interest in the tomb.


Ground penetrating radar. University of Southampton, Author provided

Underground archaeology

The geophysical survey techniques used to study the tomb have been applied in archaeology since the 1970s. GPR involves emitting electromagnetic radar waves through a structure and measuring how long it takes for them to be reflected by the different objects and elements that comprise it. Different materials reflect the radar waves at different velocity so it’s possible to use this information to build a 3D map of the structure. For KV62, the map suggests there are spaces beyond the standing walls of the tomb, which could be undiscovered antechambers.
The problem with such surveys is that the high hopes of the initial conclusions released to the public may not match the reality of later findings. The data can often be interpreted in different ways. For example, natural breaks and fissures in the rock may produce responses similar to undiscovered chambers. Scanning the relatively small area of the walls of an individual chamber can make it difficult to place the results in a broader context.
By gathering a wider range of data, we can slowly build up a clearer picture of the history of a site. While not as dramatic as uncovering a forgotten tomb, the process of using technology to gradually study a site can, directly and indirectly, significantly change our view of it or the people associated with it.
Other geophysical techniques tend to be used to study more open sites or landscapes. Magnetometry measures the variations in the Earth’s magnetic field that are caused by many forms of buried archaeological material, from fired material such as kilns to building material and filled ditches. Earth resistance measures how easily electrical current passes through the ground. Features such as walls, paving and rubble have a high resistance to current, while filled ditches and pits tend to have a low resistance.


Hidden landscape. Stonehenge Hidden Landscape Project LBIArchPRO

Uncovering the real Stonehenge

Putting such techniques to use at Stonehenge, for example, has completely transformed the way we think about how the landscape was used, and the forms of worship used by Neolithic society. Prior to the survey only a handful of ritual monuments were known around the impressive remains of Stonehenge, meaning that archaeologists could not easily evaluate the way in which the landscape was used.
The geophysical survey revealed hundreds of archaeological features, including 17 major ritual monuments. For the first time archaeologists were able to map every single possible buried monument in the landscape, including henges, pits, barrows and ditches. This means we can start to fully appreciate the way in which the ritual landscape was organised. For example, the new monuments reveal astronomical alignments that were previously unknown or only partly recognised.
Similar geophysical survey work at Ostia Antica in Italy has completely altered our theories about the layout of the city and its harbour. A magnetometer survey conducted across the area between Portus and Ostia between 2008 and 2011, discovered the presence of buried warehouses and associated structures. These were enclosed by the line of a defensive wall, showing that the extent of the ancient city included both banks of the river Tiber. This crucial fact changes the potential size of the city and alters our plan of its harbour area. This suggests much more of the city was used for storage, perhaps making it even more important as a port for nearby Rome than previously thought.


Sarum revealed. University of Southampton, Author provided

An ongoing survey at Old Sarum in Wiltshire in the UK has been studying the area surrounding the remains of the Iron-age hillfort and medieval town. Using GPR, magnetometry and earth resistance together has uncovered an unprecedented number of Roman and medieval structures, courtyards and other remains. This indicates that there was a much more substantial and complex settlement at Old Sarum much earlier than previously thought. Further work in 2016 may even prove claims of a late Saxon settlement and mint at the site.
These kinds of discoveries show that geophysical technology has a huge role to play in archaeology, both through investigation of sites and landscapes, and also of smaller monuments such as buildings and tombs. But we need to look beyond the more sensational aspects of such research and understand the role it plays in the bigger picture of uncovering the past.
The Conversation

Kristian Strutt, Experimental Officer and Geophysical Researcher, University of Southampton
This article was originally published on The Conversation. Read the original article.

MY AD 2