Toggle light / dark theme

IARPA seeks info on biometric attack detection tech

Reminder to everyone who loves hearing about what NextGen Technologies that US Government has been working on: March 11th, US IARPA is hosting a conference on “Odin” (detection technologies to ensure biometric security systems can detect when someone is attempting to disguise their biometric identity.)


The Intelligence Advanced Research Projects Activity plans to hold a conference related to a biometric presentation attack detection programme called Odin.

The conference, to be held on 11 March in Washington, will be to provide information on Odin and the research problems the program aims to address, the agency noted.

The goal of the Odin programme is to develop biometric presentation attack detection technologies to ensure biometric security systems can detect when someone is attempting to disguise their biometric identity.

Read more

Carrie Fisher conducts painful group therapy for robots

As funny as this commercial is; if the ramp up of robotics continue for the next 30 years we could see humanoid robots needing counseling. However, like AI of our past, we’ll go through a 10 yr peiod of hype and interests, and when consumers, industries, and government do not see value or advance improvements beyond walking, lifting 20lbs boxes, being part of an assembly, etc. robotics will again fall again into the background. https://lnkd.in/bQyWgBq


Technically Incorrect: A new IBM ad, released to coincide with Sunday’s Oscars broadcast, shows Fisher entirely in her element, and robots who have a lot of problems.

Read more

Russian Robonauts Working on the ISS Will Soon be Reality (Video)

Rather than risk the lives of their astronauts, Russian government scientists are now working to develop humanoid robots that can perform complex tasks on the outside of the International Space Station (ISS) while astronauts control them safely from within the station.

The Russian Foundation for Advanced Research Projects, Russia’s military research arm unveiled two prototype robot astronauts on February 13th to the media ahead of a public robotics exhibition in Moscow.

One robot, named Fyodor, has two arms and a torso, and is programmed to either mimic an astronaut’s actions, be under remote control by a human wearing a special suit, or work autonomously.

Read more

Is this the future of work? Scientists predict which jobs will still be open to humans in 2035

1st; we all know in 30 years anything can change, wars can be fought & lost, natural disasters can occur, etc. However, posting for everyone’s amusement. 30 years ago which would be 1986; no one thought USSR would be broken up, 9/11 would happen creating the US Homeland Security, Lybia & Eygpt would overthrow their own leaders, that US Space missions would be outside the US Government, hacking at the levels we have today creating the CISO roles, of VR technology would exist, DNA and CRISPR would be discovered, etc.

So, who really knows what jobs will be fully automated v. not in 30 years or even created as a result of Quantum technology (Computing, Networking, Q-Dots for numerous thing that are not only technology, etc.). Just a fun article to share with everyone.


CSIRO says the Australian workplace of the future will be increasingly digitally-focused and automated, with titles such as online chaperone.

Read more

Need To Beef Up India’s Cyber Security Policies And Mechanisms – Analysis

I luv it — India get’s it. You have to make sure that your IT foundation is solid first before unleashing things like AI. Connected AI requires a solid and secured infrastructure foundation 1st. In order for customers to buy into Cloud & the whole IoT, and connected AI set of products and services; the customer must feel that they can trust you fully.


By Jayadev Parida

Take a stock of the past, analyse the present cliché and frame a strategy for future. In the recent years, India’s approach to cyber security has experienced a shift from style to substance. Prime Minister Modi’s foreign policy has made various strong interventions on cyber security matters. Those interventions need to be materialised to manoeuvre the interest. Presumably, the Prime Minister Office (PMO) is likely to invest both political and capital energy to enhance a cautious cyber-strategy. A dedicated Division in the Indian Ministry of External Affairs (MEA) for cyber security is a value addition to that. In 2015, Minister of Communications and Information Technology in a written reply to the Lok Sabha stated that government allocated Rs 755 crore to combat cyber security threats over a period of five years. But, this financial outlay is quite negligible as the nature of threat is quite huge and unpredictable.

Cheer up, the worst is yet to come! One of those famous words penned by noted American author and novelist Mark Twain a long ago. This sentence is a stark reminder of India’s dawdling approach to new threats. India’s cyber sleuth may be holding their nerves for the worst to frame a robust apparatus to secure cyber ecosystem. The Google Trends of 2015 demonstrated that Islamic State (IS) was a buzz word in India while terrorism continued to exist as the area of concern. Nonetheless, interest over the time for IS’ in Indian Cities is increasing significantly.

Read more

Military-Funded Study Predicts Twitter Uprisings

I must admit that appears that almost anything in tech is being called out as a threat. FB, Twitter, Smartphones, CRISPR, AI, etc. Tech advancements do bring greater freedoms & opportunities to express one’s ideas and beliefs as well as enable a greater access to people, information, and geographical locations; however, and that does pose some level of risk in small pockets of the greater poulation. Nonetheless, I hope that the government spying pendullum swing doesn’t go overboard.


Who tweets at you, what you tweet back, and why can predict your next protest act on social media.

Read more

Microsoft founder Gates backs FBI in encryption fight with Apple

Microsoft founder Bill Gates has broken with other Silicon Valley giants by backing the FBI in its battle with Apple over hacking into a locked iPhone as part of the investigation into last December’s San Bernardino terror attack.

In an interview with the Financial Times published Tuesday, Gates said a court order requiring Apple to help the FBI access a work phone belonging to gunman Syed Farook was” a specific case where the government is asking for access to information. They are not asking for some general thing, they are asking for a particular case.”

Gates went on to compare the FBI’s request to accessing bank and telephone records. However, he added that the government must be subject to rules about when it can access such information.

Read more

NASA, Made in Space think big with Archinaut, a robotic 3D printing demo bound for ISS

MOFFETT FIELD, California — Within five years, companies could begin in-orbit manufacturing and assembly of communications satellite reflectors or other large structures, according to Made in Space, the Silicon Valley startup that sent the first 3D printer to the International Space Station in 2014.

As Made in Space prepares to send a second 3D printer into orbit, the company is beginning work with Northrop Grumman and Oceaneering Space Systems on Archinaut, an ambitious effort to build a 3D printer equipped with a robotic arm that the team plans to install in an external space station pod, under a two-year, $20 million NASA contract. The project will culminate in 2018 with an on-orbit demonstration of Archinaut’s ability to additively manufacture and assemble a large, complex structure, said Andrew Rush, Made in Space president.

NASA’s selected the Archinaut project, officially known as Versatile In-Space Robotic Precision Manufacturing and Assembly System, as part of its Tipping Points campaign, which funds demonstrations of space-related technologies on the verge of offering significant payoffs for government and commercial applications. Archinaut was one of three projects NASA selected in November that focus on robotic manufacturing and assembly of spacecraft and structures in orbit.

Read more

Is San Bernardino iPhone Fully Encrypted?

Here is a question that keeps me up at night…

Is the San Bernardino iPhone just locked or is it properly encrypted?

Isn’t full encryption beyond the reach of forensic investigators? So we come to the real question: If critical data on the San Bernardino iPhone is properly encrypted, and if the Islamic terrorist who shot innocent Americans used a good password, then what is it that the FBI thinks that Apple can do to help crack this phone? Doesn’t good encryption thwart forensic analysis, even by the FBI and the maker of the phone?

In the case of Syed Rizwan Farook’s iPhone, the FBI doesn’t know if the shooter used a long and sufficiently unobvious password. They plan to try a rapid-fire dictionary attack and other predictive algorithms to deduce the password. But the content of the iPhone is protected by a closely coupled hardware feature that will disable the phone and even erase memory, if it detects multiple attempts with the wrong password. The FBI wants Apple to help them defeat this hardware sentry, so that they can launch a brute force hack—trying thousands of passwords each second. Without Apple’s help, the crack detection hardware could automatically erase incriminating evidence, leaving investigators in the dark.

Mitch Vogel is an Apple expert. As both a former police officer and one who has worked with Apple he succinctly explains the current standoff between FBI investigators and Apple.


The iPhone that the FBI has is locked with a passcode and encrypted. It can only be decrypted with the unique code. Not even Apple has that code or can decrypt it. Unlike what you see in the movies, it’s not possible for a really skilled hacker to say “It’s impossible“” and then break through it with enough motivation. Encryption really is that secure and it’s really impossible to break without the passcode.

What the FBI wants to do is brute force the passcode by trying every possible combination until they guess the right one. However, to prevent malicious people from using this exact technique, there is a security feature that erases the iPhone after 10 attempts or locks it for incrementally increasing time periods with each attempt. There is no way for the FBI (or Apple) to know if the feature that erases the iPhone after 10 tries is enabled or not, so they don’t even want to try and risk it.

oceans_of_data-sSo the FBI wants Apple to remove that restriction. That is reasonable. They should, if it is possible to do so without undue burden. The FBI should hand over the iPhone to Apple and Apple should help them to crack it.

However, this isn’t what the court order is asking Apple to do. The FBI wants Apple to create software that disables this security feature on any iPhone and give it to them. Even if it’s possible for this software to exist, it’s not right for the FBI to have it in their possession. They should have to file a court order every single time they use it. The FBI is definitely using this situation as an opportunity to create a precedent and give it carte blanche to get into any iPhone without due process.

So the answer to your question is that yes it is that secure and yes, it’s a ploy by the FBI. Whether it’s actually possible for Apple to help or not is one question and whether they should is another. Either way, the FBI should not have that software.