Toggle light / dark theme

My new story for VentureBeat on the coming of robot bodyguards. I’ll be speaking about this next week at RoboBusiness 2016, a major robotics conference in San Jose:


I recently consulted with the US Navy on all things “transhuman.” In those conversations about how science and technology can help the human race evolve beyond its natural limits, it was clear that military is keen on replacing human soldiers with both fighting and peacekeeping machines so American military lives never have to come under fire or be in harm’s way.

However, it’s the peacekeeping technology that is particularly interesting for many civilians. While you wouldn’t want an armed Terminator in your home, you might like a robot that travels with you and offers personal protection, like a bodyguard. In a survey by Travelzoo of 6,000 participants, nearly 80 percent of people said they expect robots to be a significant part of their lives by 2020 — and that those robots might even join them on holidays.

The robotics industry is already considering this, and recently debuted some security models. A few months ago China came out with its Anbot, which can taser people and be used for riot control. And South Korea already uses mobile robot guards in its prisons. Even in San Francisco, you can rent out robot guards to protect your businesses and property. However, the rent-a-robot company, Knightscope, recently came under fire for accidentally running over a toddler at the Stanford Shopping Center.

Definitely less than a decade and even less than 7 especially with China Quantum Satellite, Google’s plan release next year of a Quantum device, etc. I hope folks don’t still believe that we’re immune from a QC attack after 2025.


In a rare public speech, Greta Bossenmaier, chief of the Communications Security Establishment, said cryptologists at the CSE and around the world are racing to find new cryptographic standards before Y2Q — years to quantum — predicted for 2026.

She is the third senior CSE official this week to warn publicly of the threat quantum computing poses to widely used public key cryptography (PKC), protecting sensitive data transmissions from hackers, hacktivists, foreign state spies and other malicious actors.

READ MORE: Why the silencing of KrebsOnSecurity opens a troubling chapter for the internet.

QC will need to be on any IT, Security, and/ or tech connected product future state roadmap that spans a 5 + year period because the planning, funding, change management (retooling of resources), etc. will take time to plan & prepare not to mention all those internal & external dependencies and their own efforts around QC in the future because it truly would stink to see an AT&T, or HomeDepot, etc. that invested in their own QC compliant infrastructure suddenly attacked because an external source that they pull from is not QC.


The encryption we take for granted as being uncrackable would have a limited shelf-life in the quantum age, says a security expert.

Read more

My suggestion; don’t be one of those companies and governments in the next 5yrs that waits until the 9th hour meanwhile others planned, invested, and executed properly so they’re not exposed like you are.


The race to create new cryptographic standards before super-fast quantum computers are built that can rip apart data protected by existing encryption methods isn’t going fast enough, two senior Canadian officials have warned a security conference.

“I think we are already behind,” Scott Jones, deputy chief of IT security at the Communications Security Establishment (CSE), responsible for securing federal information systems, told the fourth annual international workshop on quantum-safe cryptography in Toronto on Monday.

Quantum computing – or more accurately, computers that use quantum mechanics – is not a dream, Jones and others told the conference of business executives, crypto academics, IT companies and government officials. One prediction is there’s a one in seven chance that by 2026 a quantum computer will exist that can break RSA-2048 encryption. It may take longer — or, if there’s an advance, shorter.

Wireless security and internet standards experts release a complete quantum resistant toolkit for commercial use.

TORONTO, Sept. 19, 2016 /CNW/ — 4TH ETSI/IQC Workshop on Quantum-Safe Cryptography – ISARA Corporation today announced the availability of its ISARA Quantum Resistant (IQR) Toolkit. The toolkit helps software and hardware solution providers build robust commercial products that protect vulnerable infrastructure against the threat quantum computing already poses to widely-used security standards.

Similar to the Y2K crisis, the technology industry is facing a ‘Y2Q’ (years to quantum) challenge that has a limited timeline and requires significant work to ensure systems and information are properly protected. The massive processing power of quantum computers is such that, without integrating quantum resistant security solutions, all security that depends on existing standards is vulnerable.

Read more

Ouch!


According to a countdown clock from Sen. Ted Cruz, there are less than three weeks until the Obama administration puts the Internet at risk from takeover and censorship by China, Russia, and Iran. This conspiratorial fearmongering is, frankly, absurd.

But just because this particular alleged conspiracy is insane doesn’t mean that there is no conspiracy. Of course authoritarian regimes want more control over the Internet, and at this very moment, they are working through the U.N. to get it. But instead of targeting the administration of the domain name system (which, thanks to the so-called “IANA transition” Sen. Cruz opposes, is nearly out of their reach), their chosen vehicle is next-generation Internet standards, particularly an arcane proposal called the Digital Object Architecture (DOA). The best way to stop authoritarian regimes and keep the Internet free is to go through with the transition.

DOA is the brainchild of the legendary Bob Kahn, co-inventor of the Internet’s TCP/IP protocol. The Internet does a great job of moving bits around the world, but it isn’t always so good at authentication, rights management, and access controls. Kahn’s idea, dating back to the early 1990s, is to bake “information management” directly into core protocols. What if every piece of data and every device that accessed the network had a permanent, trackable unique identifier? If you wanted to access information on the network, the system would decide if you were authorized to receive it and, if so, allow you to fetch it.

The Pentagon wants to fundamentally change how social science research is conducted.

The Defense Department uses principles of human behavior to make major decisions affecting national security, but social science is inherently limited, according to the Defense Advanced Research Projects Agency, mostly because social scientists “rarely, if ever, have ground truth” about “actual causes of observed behaviors in the ‘real world.’”

To help mitigate those shortcomings, DARPA is gathering information on ways, and potentially new technology, that can assess how closely social science research methods do represent the real world. Simulations, for instance, could be used to calibrate whether the inferences about human behavior social scientists make when they’re conducting an analysis are valid.

Read more

“The vast majority of space technology being developed is dual-use, and so serves Chinese security interests as well,” says Johnson-Freese, an expert on the Chinese space program and a professor at the US Naval War College. “China understands the military advantages reaped by US space capabilities for many years, and wants those same capabilities”.

Read more

Nice.


“We’ve managed to put quantum-based technology that has been used in high profile science experiments into a package that might allow it to be used commercially.”

Random number generators are crucial to the encryption that protects our privacy and security when engaging in digital transactions such as buying products online or withdrawing cash from an ATM. For the first time, engineers have developed a fast random number generator based on a quantum mechanical process that could deliver the world’s most secure encryption keys in a package tiny enough to use in a mobile device.

In The Optical Society’s journal for high impact research, Optica, the researchers report on their fully integrated device for random number generation. The new work represents a key advancement on the path to incorporating quantum-based random number generators — delivering the highest quality numbers and thus the highest level of security — into computers, tablets and mobile phones.