The architecture of surveillance is everywhere and nowhere. And it includes one of the creepiest-looking buildings New Yorkers know: 33 Thomas Street, a 41-year-old windowless skyscraper in lower Manhattan that houses infrastructure for transmitting phone calls, faxes, and internet data—and equipment for tapping them, too.
The mysterious monolith is the subject of a spooky new 10-minute film, Project X, by Laura Poitras and Henrik Moltke, which was projected on the building itself last night, along with National Security Agency documents such as diagrams from inside, original architectural drawings of the building, and NSA logos.
Conversation AI represents just one of Jigsaw’s wildly ambitious projects. The New York–based think tank and tech incubator aims to build products that use Google’s massive infrastructure and engineering muscle not to advance the best possibilities of the Internet but to fix the worst of it: surveillance, extremist indoctrination, censorship. The group sees its work, in part, as taking on the most intractable jobs in Google’s larger mission to make the world’s information “universally accessible and useful.”
This may look like a fun tree house. But look closer and you find all kinds of high-tech security including a biometric fingerprint lock
“Unique to this project was the high site security required by the client. “Someone from the client’s security detail remained with our craftsmen at every moment — even to the toilet or while waiting outside of the door to enter. My staff was required to hand in their passports, mobile phones and cameras to armed security personnel at the main entrance,” says Payne.”
Actually nothing to do with icrecream, but CSO highlights a variety of digital breaches
The Verizon RISK Team performs cyber investigations for hundreds of commercial enterprises and government agencies annually across the globe. In 2015, they investigated more than 500 cybersecurity incidents. They shared some of the details in a recent report of how they solved the cyber crimes.
Israel based Clipfort’s sensor-equipped magazines have fingerprint identification to prevent an unauthorized user from loading ammunition. The biometrics, built into the clip, are being designed for most guns, the company says.
ID confirmation takes 0.7 seconds. Given a match, the clip can load bullets until the magazine is removed from the gun.
K2, founded by corporate investigators Jules Kroll and his son Jeremy, has been bulking up its cyber-response unit with former FBI agents. AIG, one of the first firms to offer insurance for property damage caused by hackers, is counting on Berglas' team to investigate attacks on policyholders. It's also asking K2 to provide data on threats to protect clients from events that could cost hundreds of millions of dollars.
"We'd like to aggregate that data to use for ourselves, but also to use for our clients so they know what industries are being targeted by what type of attackers, what the motivation is, if it's on the rise," said Tracie Grella, who oversees cybercoverage at AIG for clients including retailers, banks and energy companies.
Grella said AIG will offer coverage limits of as much as $100 million for property damage and $100 million in bodily injury caused by a cyberattack. She predicts the market could balloon to $10 billion in annual premiums by 2020, compared with about $2 billion this year, as more companies buy policies.
The first two-thirds of the cyber analysis course consist of mundane but essential subjects meant to help students understand the making and breaking of computer systems. These include math, basic programming, Windows and Unix operating systems, and the science behind networks and wireless technologies. Then students move on to the fundamentals of hacking: target research, signal analysis, network defense, and malware. They learn to hack a simulated network with open source software and tools such as Metasploit. The curriculum is adjusted to keep pace with advances in both offensive and defensive tactics, an unusual challenge for the military, says Maureen Fox, CID’s commanding officer. “Missile technology changes, but it doesn’t change in a day or an hour,” she says. “The technology in the area we’re in does.”
BusinessWeek in a story on US Navy’s Corry Station base in Pensacola, FL
sounds counter-intuitive but what Google is doing internally according to the WSJ
“With this approach, trust is moved from the network level to the device level. Employees can only access corporate applications with a device that is procured and actively managed by the company. In this setup, Google requires a device inventory database that keeps track of computers and mobile devices issued to employees as well as changes made to those devices.
After the device is authenticated, the next step involves securely identifying the user. Google tracks and manages all employees in a user database and a group database that is tied into the company’s human resources processes. These databases are updated as employees join the company, change responsibilities or leave the company. There’s also a single sign-on system, a user authentication portal that validates employee use against the user database and group database, generating short-lived authorization for access to specific resources.”