This was not a scene from a new X-Men movie, but an event organised by two Cambridge institutions: the Centre for the Study of Existential Risk (CSER, commonly referred to as "caesar") and the Leverhulme Centre for the Future of Intelligence. For them, it was a fairly ordinary evening, in this case following a lecture by Katyal. The apocalyptic talk is standard: both bodies are among a small group of organisations in the UK and US which employ highly educated academics, scientists, lawyers and philosophers to study existential risk.
The architecture of surveillance is everywhere and nowhere. And it includes one of the creepiest-looking buildings New Yorkers know: 33 Thomas Street, a 41-year-old windowless skyscraper in lower Manhattan that houses infrastructure for transmitting phone calls, faxes, and internet data—and equipment for tapping them, too.
The mysterious monolith is the subject of a spooky new 10-minute film, Project X, by Laura Poitras and Henrik Moltke, which was projected on the building itself last night, along with National Security Agency documents such as diagrams from inside, original architectural drawings of the building, and NSA logos.
Conversation AI represents just one of Jigsaw’s wildly ambitious projects. The New York–based think tank and tech incubator aims to build products that use Google’s massive infrastructure and engineering muscle not to advance the best possibilities of the Internet but to fix the worst of it: surveillance, extremist indoctrination, censorship. The group sees its work, in part, as taking on the most intractable jobs in Google’s larger mission to make the world’s information “universally accessible and useful.”
This may look like a fun tree house. But look closer and you find all kinds of high-tech security including a biometric fingerprint lock
“Unique to this project was the high site security required by the client. “Someone from the client’s security detail remained with our craftsmen at every moment — even to the toilet or while waiting outside of the door to enter. My staff was required to hand in their passports, mobile phones and cameras to armed security personnel at the main entrance,” says Payne.”
Actually nothing to do with icrecream, but CSO highlights a variety of digital breaches
The Verizon RISK Team performs cyber investigations for hundreds of commercial enterprises and government agencies annually across the globe. In 2015, they investigated more than 500 cybersecurity incidents. They shared some of the details in a recent report of how they solved the cyber crimes.
Israel based Clipfort’s sensor-equipped magazines have fingerprint identification to prevent an unauthorized user from loading ammunition. The biometrics, built into the clip, are being designed for most guns, the company says.
ID confirmation takes 0.7 seconds. Given a match, the clip can load bullets until the magazine is removed from the gun.
K2, founded by corporate investigators Jules Kroll and his son Jeremy, has been bulking up its cyber-response unit with former FBI agents. AIG, one of the first firms to offer insurance for property damage caused by hackers, is counting on Berglas' team to investigate attacks on policyholders. It's also asking K2 to provide data on threats to protect clients from events that could cost hundreds of millions of dollars.
"We'd like to aggregate that data to use for ourselves, but also to use for our clients so they know what industries are being targeted by what type of attackers, what the motivation is, if it's on the rise," said Tracie Grella, who oversees cybercoverage at AIG for clients including retailers, banks and energy companies.
Grella said AIG will offer coverage limits of as much as $100 million for property damage and $100 million in bodily injury caused by a cyberattack. She predicts the market could balloon to $10 billion in annual premiums by 2020, compared with about $2 billion this year, as more companies buy policies.
The first two-thirds of the cyber analysis course consist of mundane but essential subjects meant to help students understand the making and breaking of computer systems. These include math, basic programming, Windows and Unix operating systems, and the science behind networks and wireless technologies. Then students move on to the fundamentals of hacking: target research, signal analysis, network defense, and malware. They learn to hack a simulated network with open source software and tools such as Metasploit. The curriculum is adjusted to keep pace with advances in both offensive and defensive tactics, an unusual challenge for the military, says Maureen Fox, CID’s commanding officer. “Missile technology changes, but it doesn’t change in a day or an hour,” she says. “The technology in the area we’re in does.”
BusinessWeek in a story on US Navy’s Corry Station base in Pensacola, FL