Insurance Companies Will Shape the Future of Cyber Security — Reverb Advisors
Companies now consider potential losses from a cyber breach as a cost of doing business. CFOs are even factoring potential losses into financial projections. Rather than increasing spending on what appears to be a lost cause, more and more organizations are simply buying cyber security insurance for the eventuality of a breach. A major advantage of cyber security insurance is the insurer is responsible for quantifying risk. ... "

"As an industry, we’ve arrived at an interesting point. Companies no longer have to care about how much a breach will cost, just how much cyber security insurance costs."

"As Bruce Schneier points out, it’s not about technology for threat avoidance, it’s about strategies for risk management."

“Of course, it’s in the insurers best interest to accurately model risk and encourage companies to prevent breaches. . . . The biggest challenge (and opportunity), lies in how to accurately model cyber security risk. . . . Despite the fact that many insurers are essentially eyeballing it, business is booming. . . . But there still remains massive uncertainty around how to validate model accuracy and optimize policy pricing. ”

"Risk scores should not be based on expert opinions that can’t be assessed, but on statistical correlation with historical breaches. "
cybersecurity  risk-management  insurance 
8 hours ago
Security flaw in Medtronic heart defibrillators is serious, DHS says, but don't panic - Cyberscoop Mar 2019
"The Department of Homeland Security has issued an advisory warning that a vulnerability in Medtronic heart defibrillators could allow hackers to change the settings in a medical device from within radio range."

"The issue involves Conexus, Medtronic’s radio-frequency protocol that’s used for communication between medical technology such as defibrillators, home monitoring devices and other clinician programming tools. Conexus connections fail to implement any kind of authentication or authorization, according to DHS. That means that, in situations where a product’s radio is activated, outsiders can exploit the connection to read and write memory in the cardiac device."
healthcare  cyber-spectrum  spectrum-vulnerability 
AT&T’s “5G E” is actually slower than Verizon and T-Mobile 4G, study finds | Ars Technica
AT&T's "5G E" service is slightly slower than Verizon's and T-Mobile's advanced 4G LTE networks, a study by OpenSignal has found.

"AT&T's network name change may well trick consumers into thinking they're getting better service than a 4G operator, but they aren't. We already knew that 5G E has no technological advantage over LTE-Advanced, because they are the same thing with different names. But actual speed tests could reinforce that point."
ArsTechnica  AT&T  5G  hype 
Norsk Hydro cyber attack: What's new? - Help Net Security Mar 2019
Norwegian aluminum producer Norsk Hydro ASA was hit by ransomware-wielding attackers early this week.

“As best we can tell now, it appears the adversary likely compromised Active Directory at Norsk to use legitimate means to spread the ransomware widely and quickly."
ransomware  cybersecurity  NorskHydro 
Hackers Hijacked ASUS Software Updates to Install Backdoors on Thousands of Computers - Motherboard Mar 2019
The Taiwan-based tech giant ASUS is believed to have pushed the malware to hundreds of thousands of customers through its trusted automatic software update tool after attackers compromised the company’s server and used it to push the malware to machines.
malware  security  hacking  cybersecurity 
Scientists think they’ve solved one mystery of Easter Island’s statues | Ars Technica Mar 2019
"Lipo and Broadman meticulously mapped out where those fresh water sources were located all around the island, and wherever they found fresh water pockets along the coast, they also found ahu. (Fresh water also pools in craters on the island, forming lakes, but the archaeological evidence didn't support houses and villages in those areas.) They used a technique called quantitative spatial modeling to demonstrate that the pattern they observed was statistically sound, not just a matter of human perception."
ArsTechnica  archaeology  water  hydrology 
Family tracking app leaked real-time location data for weeks - Engadget Mar 2018
"Family tracking apps can be very helpful if you're worried about your kids or spouse, but they can be nightmarish if that data falls into the wrong hands. Security researcher Sanyam Jain has revealed to TechCrunch that React Apps' Family Locator left real-time location data (plus other sensitive personal info) for over 238,000 people exposed for weeks in an insecure database. It showed positions within a few feet, and even showed the names for the geofenced areas used to provide alerts. You could tell if parents left home or a child arrived at school, for instance."

"While the data is safe for now, the incident illustrates a problem with tracking apps as a whole: it's difficult to verify that developers are securing your location info every step of the way. If they don't and there's a breach, it could lead to very real threats that could include physical danger."
Engadget  GPS  surveillance  data-leaks  hacking  spectrum-vulnerability  cyber-spectrum  vulnerability 
2 days ago
Next release of CBRS specs will support 5G | FierceWireless Mar 2019
"Just as OnGo-branded commercial services are preparing for takeoff, the CBRS Alliance announced that it’s starting work on a new release to support CBRS over 5G.

The organization said that Release 3 will address support for 5G deployments using shared spectrum in the 3.5 GHz band, complementing the 5G New Radio (5G NR) air interface developed by the 3GPP to support a variety of 5G services, devices and deployments. (It’s worth noting that many of the contributors to the specs are affiliated with both the 3GPP and CBRS Alliance.)

The alliance actually started doing a call for 5G contributions a little while back, so the work is not in its infancy, but the 5G work is going to take a while to complete, according to Chris Stark, chairman of the CBRS Alliance."
FierceWireless  5G  CBRS 
4 days ago
4 Big Challenges for Emerging Space - NSR - Mar 2019
"With companies moving beyond the R&D phase into operations (48% of total companies founded today, up from 43% in 2016), a healthy market dynamic exists, but on the road to success, there are 4 critical elements common to most emerging space players that NSR identified across all segments."

1. funding
2. regulatory barriers
3. market readiness
4. technology development

"3 segments of the market, namely:
Earth-to-Space (E2S): infrastructure/services developed on Earth to facilitate the use of space (manufacturing and launch)
Space-to-Earth (S2E): services delivered from assets in space for use on Earth (satcom services, downstream geospatial analytics etc.)
Space-to-Space (S2S): including services delivered in space (space tourism, in-orbit servicing etc.)"
NSR  space  satellite  business 
4 days ago
Using a COTS SDR as a 5G Development Platform | 2019-02-08 | Microwave Journal
This article is intended to familiarize radio engineers with the use of a multi-purpose commercial off-the-shelf (COTS) platform for software-defined radio (SDR) that can reduce development time for 5G.

COTS SDR has been traditionally used in military radar and communications applications for high performance and design flexibility. The latest COTS SDR products offer solutions with integrated I/O, ARM processors and large FPGAs that also include intellectual property (IP) for accessing, routing and processing digital data. These attributes, combined with superior signal integrity, phase-coherent sampling and multi-channel transceivers, make a COTS SDR system an ideal choice for a 5G development platform.
MicrowaveJournal  COTS  SDR  5G 
6 days ago
Stakeholders not keen on EC’s reconfigurable radio systems proposal | PolicyTracker: Mar 2019
"A European Commission (EC) proposal to ensure that software uploaded onto radio equipment doesn't harm spectrum access, interoperability, safety or access to emergency services has drawn a mostly negative reaction from stakeholders who fear the rule could stifle innovation and competition. The EC said in its initial impact assessment that it is mulling a regulation on reconfigurable radio systems (RRS) under the EU Radio Equipment Directive (RED)."

"The EC laid out five options:

maintain the current situation in which device makers aren’t required to implement any specific measures (Option 0)
industry self-regulation to ensure that software doesn’t compromise initial compliance (Option 1)
adopt a regulation under Article 4 of the RED to require that manufacturers of radio equipment, or of software allowing radio equipment to be used as intended, inform member states and the EC about how the intended combination will comply before the software can be uploaded (Option 2)
adopt a regulation under Article 3(3)(i) of the RED to require that radio equipment support certain features in order to ensure that software can only be uploaded into it where the compliance of the combination of the equipment and software has been demonstrated for the purposes of market access (Option 3)
adopt a regulation requiring that both Options 2 and 3 be demonstrated before equipment is allowed on the market (Option 4).

"The 276 feedback messages received showed strong opposition to any option but doing nothing or allowing industry self-regulation."
PolicyTracker  SDR  EC  EuropeanCommission  spectrum  regulation 
6 days ago
AI Update: What Happens When a Computer Denies Your Insurance Coverage Claim? | Global Policy Watch Mar 2019
"Artificial intelligence is your new insurance claims agent. For years, insurance companies have used “InsurTech” AI to underwrite risk. But until recently, the use of AI in claims handling was only theoretical. No longer. The advent of AI claims handling creates new risks for policyholders, but it also creates new opportunities for resourceful policyholders to uncover bad faith and encourage insurers to live up to their side of the insurance contract."

"Now it is only a matter of time before insurers face pressure to use the available technology to deny claims as well.So what happens when a claim is denied?"

"If a policyholder prevails on a bad faith claim, it may be entitled to attorneys’ fees and punitive damages. Bad faith claims provide a counterweight to insurance companies’ information advantages, and can dramatically increase potential damages."

"The flip side of that complexity is that bad faith discovery may encourage early cooperation from the insurer. With their technology on the line, insurers may have a heightened incentive to pay what is due or otherwise settle before discovery for several reasons ..."
Covington  insurance  AI  law 
6 days ago
National Risk Management | Homeland Security
The National Risk Management Center (NRMC) is the Cybersecurity and Infrastructure Security Agency’s (CISA) planning, analysis, and collaboration center working to identify and address the most significant risks to the Nation’s critical infrastructure. Through the NRMC’s collaborative efforts with the private sector, government agencies, and other key stakeholders, the CISA works to identify, analyze, prioritize, and manage high-consequence threats to critical infrastructure through a crosscutting risk management paradigm.
DHS  cybersecurity  risk-management 
7 days ago
Cybersecurity and Infrastructure Security Agency | US-CERT
On November 16, 2018, the President signed into law the Cybersecurity and Infrastructure Security Agency Act of 2018. This Act elevates the mission of the former Department of Homeland Security (DHS) National Protection and Programs Directorate (NPPD) and establishes the Cybersecurity and Infrastructure Security Agency (CISA). CISA is responsible for protecting the Nation's critical infrastructure from physical and cyber threats, a mission that requires effective coordination and collaboration among a broad spectrum of government and private sector organizations.
cybersecurity  US  USGovernment  legislation 
7 days ago
Aromatherapy and Essential Oils | AromaWeb
individual oil pages give top/middle/low note info, inter alia
7 days ago
How OneWeb plans to make sure its first satellites aren't its last - SpaceNews.com
Jeff Foust's paraphrase:

"Despite the work ahead to build and launch its satellites, many see OneWeb's biggest risks as financial rather than technical. . . . The company, which once pegged the cost of the constellation at $1.5 billion to $2.5 billion, no longer provides estimates of its cost, and some industry experts project the system will cost as much as $7.5 billion. That could create financial difficulties, especially if initial revenue growth is slow. "
OneWeb  satellite  business 
7 days ago
Established players can become cloud service providers - Analysys Mason Mar 2019
"Hyper-scalers such as AWS, Azure and Google are expanding their public cloud services globally, which makes it more difficult for moderately sized (relatively speaking) cloud providers to be competitive with their infrastructure-as-a-service (IaaS) and platform-as-a-service (PaaS) offerings. Nevertheless, a growing opportunity exists for these smaller cloud providers to supply additional solutions and services above and beyond what is provided by the hyper-scalers. Many hosters and service providers are moving away from offering services on their own data centres and are offering more managed services instead."

"Businesses will need support in order to navigate the changes to their IT environments during the transition to the cloud. Hyper-scalers such as AWS, Azure and Google rely on partners to distribute their IaaS offerings and create bundled solutions for end users. This includes onboarding workloads and providing uptime assurance and added security. Service providers can also analyse KPIs to ensure optimal performance for given workloads. This is where cloud service providers can make an impact, and some are already well-positioned to do so."

"CenturyLink and Rackspace are just two examples of cloud providers that are placing a greater emphasis on building stronger partnerships with hyper-scalers in order to offer their customers the most well-rounded cloud experience possible"
AnalysysMason  cloud  computing  business  CenturyLink  Rackspace 
7 days ago
Air Force experiment NTS-3 could point the way to the next generation of GPS - SpaceNews.com Mar 2019
"As an immediate response, the Air Force has begun deploying more-advanced GPS satellites, called GPS 3, designed to be more resistant to jamming and spoofing.

The Air Force also is looking for ways to shore up the PNT capabilities provided by GPS. One approach the Air Force believes could work is to supplement its medium Earth orbiting GPS constellation with an additional layer of smaller satellites in geosynchronous Earth orbit.

To test that idea, the Air Force Research Laboratory in 2022 will launch an experimental PNT satellite called NTS-3, short for Navigation Technology Satellite 3."

"As the U.S. military’s first Navigation Technology Satellite mission in 40 years, NTS-3 is intended to test new hardware including a digital signal generator that can be reprogrammed on orbit, enabling operators to quickly deploy new signals as they encounter electronic threats."

"The Air Force still has 31 GPS 2 satellites in service and has only just begun to deploy its GPS 3 constellation. "
SpaceNews  GPS  satellite  USAF  DoD 
8 days ago
Breaking LTE on Layer Two - alter-attack.net, 2019
Breaking LTE on Layer Two
David Rupprecht, Katharina Kohls, Thorsten Holz, and Christina Pöpper
Ruhr-Universität Bochum & New York University Abu Dhabi
security  LTE  spectrum-vulnerability  cyber-spectrum 
8 days ago
[pdf] A Holistic Approach to Protect, Toughen & Augment: Industry is Ready to Help With Resilient PNT - courtois.pdf
Jean-Yves Courtois, Chief Executive Officer, Orolia
at 22nd meeting of Space-based Positioning Navigation and Timing
Dec 5-6, 2018, Redondo Beach CA
See https://www.gps.gov/governance/advisory/meetings/2018-12/ for agenda
9 days ago
How a 50-year-old design came back to haunt Boeing with its troubled 737 Max jet - Los Angeles Times Mar 2019
"That low-to-the-ground design was a plus in 1968, but it has proved to be a constraint that engineers modernizing the 737 have had to work around ever since. The compromises required to push forward a more fuel-efficient version of the plane — with larger engines and altered aerodynamics — led to the complex flight control software system that is now under investigation in two fatal crashes over the last five months."

"The crisis comes after 50 years of remarkable success in making the 737 a profitable workhorse. Today, the aerospace giant has a massive backlog of more than 4,700 orders for the jetliner and its sales account for nearly a third of Boeing’s profit."

"The crisis comes after 50 years of remarkable success in making the 737 a profitable workhorse. Today, the aerospace giant has a massive backlog of more than 4,700 orders for the jetliner and its sales account for nearly a third of Boeing’s profit. But the decision to continue modernizing the jet, rather than starting at some point with a clean design, resulted in engineering challenges that created unforeseen risks."

"Over the years, the FAA has implemented new and tougher design requirements, but a derivative gets many of the designs grandfathered in, . . ."

"If the results of the investigation do not undermine the fundamental design of the aircraft, then the 737 Max’s future may not be in peril, aviation experts said. It may turn out all that’s needed is a software fix or additional pilot training."
LATimes  aviation  design  Boeing 
9 days ago
Introducing Cathy Wilkes | British Pavilion artist 2019 | Venice Biennale - YouTube
Cathy Wilkes has been selected to represent Great Britain at the 58th International Art Exhibition – La Biennale di Venezia.
sculpture  installation  art  BritishCouncil  video  YouTube  * 
9 days ago
Metric of the Month: Service Desk Cost per Ticket | HDI
North America

Cost per ticket: $15.56 avg
Cost per minute of handle time: avg $1.60
techstuff  technology  tech-support  metrics  commerce  business 
10 days ago
Overhyped 5G is being 'rushed', Britain's top comms boffin reckons • The Register, Mar 2019
If anyone knows the state of play in 5G, it's Regius Professor Rahim Tafazolli, director and founder at the Institute of Communication Systems and 5G Innovation Centre at the University of Surrey, and the government's go-to man for mobile technology. But he warned today that the industry was being too hasty in proclaiming the revolution.
TheRegister  5G  hype 
11 days ago
DeepMind and Google: the battle to control artificial intelligence | 1843 April.May 2019
So far, Google has not interfered much with DeepMind. But one recent event has raised concerns over how long the company can sustain its independence.
Google  DeepMind  AI  TheEconomist 
12 days ago
Capitalism’s New Clothes | Evgeny Morozov
"Shoshana Zuboff's new book on “surveillance capitalism” emphasizes the former at the expense of the latter"

Thesis I: "a phenomenon called surveillance capitalism"; "a set of observations, not a hypothesis"

Thesis II: "it posits that surveillance capitalism not only produces effects that are unequivocally worse than those of alternative digital regimes, but that it’s also becoming the hegemonic form of capitalism"

Thesis III: "the tautology ...: surveillance capitalists engage in surveillance capitalism because this is what the imperatives of surveillance capitalism demand"

Thesis II is a bundle of several propositions:

i) information civilization could choose between surveillance capitalism and advocacy capitalism;

ii) both leverage data extraction: one to procure behavioral surplus, one to improve services;

iii) certain features of information civilization have made surveillance capitalism hegemonic;

iv) as it becomes hegemonic, so do its imperatives;

v) in its social effects, surveillance capitalism is worse than its alternatives.

surveillance  capitalism  economics  books  review  Shoshana-Zuboff  Evgeny-Morozov  TheBaffler 
12 days ago
“The Distracted” by James Valvis | Rattle: Poetry, Fall 2018
"I have this theory writing was invented by introverts who didn’t want extroverts having all the story-telling fun"
poetry  Rattle  introversion  quotations 
12 days ago
Neil Postman Award for Metaphor | Rattle: Poetry
Neil Postman Award for Metaphor Winners

"Much like George Lakoff and Ludwig Wittgenstein, Postman maintained that words (and words, in truth, are metaphors) are as much the driver of reality as they are the vehicle. ... For Postman, the study of metaphor was unending and metaphors were as crucial as they were omnipresent; they served to give form to and dictate experience. Is America the great melting pot, or is it an experiment in unity through diversity? What metaphors are embedded in television commercials ... Put simply, Postman (like his teacher and hero, Marshall McLuhan), maintained that the medium through which information is conveyed directly colors meaning and our sense of the world ... We are, essentially, what we see, hear, and read. Postman might go so far as to opine that we are the metaphors we use."

This makes me wonder about metaphor shading into myth...
poetry  Rattle  metaphor  Neil-Postman  mythology 
12 days ago
Satcom Future Hinges on Electronically-Steered FPAs - NSR Mar 2019
"When the term “flat panel antenna” (FPA) is mentioned, most envision a completely flat, non-moving piece of communications technology. These systems, specifically electronically-steered antennas (ESAs), capable of faster tracking and pointing than parabolic ones, are seen as an impending necessity for satcom, especially given the soon-to-be full skies of LEO constellations. Interest and development in this technology has grown significantly in recent years, from Kymeta shipping the first commercial ESAs in 2017 to large contracts signed, pending product release.

However, ESA technology is still under-developed, mostly unavailable, expensive to engineer and suffering numerous delays. Currently, only 4 manufacturers (Kymeta, hiSky, SatCube, and SatPro) have ESAs for broadband-via-satellite available on the market, and given the importance of this technology for LEO networks, one wonders just when will this technology take off, and what happens if it does not?"

"NSR’s Flat Panel Satellite Antennas, 4th Edition report forecasts the market to transition strongly after 2020, with ESAs accounting for 97% of FPAs shipped in 2028. While mechanically-steered antennas (MSAs) currently dominate the FPA market, at 95.5% of shipped units, non-GEO networks, competition, and improved technology are expected to strongly pivot market take-up once LEO constellations are launched and operational. However, MSAs have begun to make successful inroads, and in some cases are expected to continue to provide competition to ESAs even after the technology becomes more available."
NSR  satellite  antennas  FPA  ESA  market-research 
12 days ago
Senate Reintroduces IoT Cybersecurity Improvement Act | Global Policy Watch Mar 2019
On March 11, 2019, a bipartisan group of lawmakers including Sen. Mark Warner and Sen. Cory Gardner introduced the Internet of Things (IoT) Cybersecurity Improvement Act of 2019. The Act seeks “[t]o leverage Federal Government procurement power to encourage increased cybersecurity for Internet of Things devices.” In other words, this bill aims to shore up cybersecurity requirements for IoT devices purchased and used by the federal government, with the aim of affecting cybersecurity on IoT devices more broadly.To accomplish this goal, the Act puts forth several action items for the Director of the National Institute of Standards and Technology (“NIST”) and the Office of Management and Budget (“OMB”). Details of these action items and their deadlines are discussed below.
Covington  IoT  cybersecurity  legislation 
12 days ago
(54) What This Photo Doesn't Show - YouTube
This photograph of young farmers on their way to a dance was taken in Germany in 1914 by August Sander. Except they weren't farmers. And the dance they were on their way to was World War I.
PBS  photography  art  Criticism 
14 days ago
Annual Credit Report.com - Home Page
via Brian Krebs, https://krebsonsecurity.com/2019/03/myequifax-com-bypasses-credit-freeze-pin/
"This service entitles each consumer one free copy of their credit report annually from each of the three credit bureaus — either all at once or spread out over the year."
banking  credit  finance 
14 days ago
Who Wins in the Name Game? - The Atlantic - Pocket
Not being able to pronounce a name spells a death sentence for relationships. That’s because the ability to pronounce someone’s name is directly related to how close you feel to that person. Our brains tend to believe that if something is difficult to understand, it must also be high-risk.

In fact, companies with names that are simple and easy to pronounce see significantly higher investments than more complexly named stocks, especially just after their initial public offerings when information on the stock’s fundamentals are most scarce. People with easier to pronounce names are also judged more positively and tend to be hired and promoted more often than their more obscurely named peers.
theAtlantic  names  language 
14 days ago
Five Inconvenient Facts about the Migration to 5G Wireless - CircleID Mar 2019
"How do these prescriptions promote competition and help consumers? Plain and simple, they do not, but that does not stop well-funded campaigns from convincing us that less competition is better. Set out below, I offer five obvious but obscured truths. "
Rob-Frieden  5G  hype  CircleID 
14 days ago
Lawmakers to form bipartisan caucus to promote the economic, national security benefits of GPS - SpaceNews.com Mar 2019
The Global Positioning System constellation will have its own caucus of supporters on Capitol Hill, Sen. Tammy Duckworth (D-Ill.) and Sen. Joni Ernst (R-Iowa) announced on Monday.

The caucus will seek to promote the economic, national security and infrastructure benefits of GPS technology, and will drive attention to the risks and oversight challenges that face the GPS industry, the senators said in a news release.
SpaceNews  GPS  Congress 
14 days ago
Hackers once stole casino database through lobby fish tank thermometer - Business Insider
= The CEO of the cybersecurity firm Darktrace says hackers are increasingly targeting unprotected "internet of things" devices, such as air-conditioning systems and CCTV, to get into corporate networks.

= She told the WSJ CEO Council Conference that in one incident, a casino was hacked through the thermometer in its lobby aquarium.

= A former director of the UK's Government Communications Headquarters also called for laws outlining minimum security standards for internet-of-things devices.
hacking  BusinessInsider  IoT 
14 days ago
GPS Flaw: Security Expert Says He Won't Fly April 6 - Mar 2019
Don't look now, but there's another Y2K-like computer-calendar problem on the way, and this one arrives in just one month: April 6, 2019. That's the day millions of GPS receivers will literally run out of time, rolling over their time counters back to zero, thanks to limitations in timekeeping for older GPS devices. Many navigation systems may be affected, such as on ships or older aircraft, although your smartphone will be fine.
17 days ago
There's Something Very Weird Going on With Cars' GPS Systems at the Geneva Motor Show
"As you may know, the Geneva Motor Show public days are this week, and while we’ve been covering a number of interesting concepts and cars at the show, there’s also something happening there that no one can really explain. For some reason, many of the cars are showing their location as being in Buckingham, England, and the year as 2036. "

"He told me that the false GPS signal is “pissing off” the carmakers because it’s making their systems look bad and/or vulnerable.

Even when employees from the carmakers try to manually reset the GPS location and the date, the spoofed signals overwrite the manually-entered information, so that’s not an option.

Echivard also told me that because the signal is not “permanent” they are unable to triangulate its location. "
GPS  spoofing  automobile 
17 days ago
The historical burden of antisemitism | In the Long Run - Helen Thompson, Mar 2019
"The Labour Party’s crisis over antisemitism under Jeremy Corbyn’s leadership has an air of inevitability. Yet the party’s tribulations brought about by Corbyn’s past and present political commitments are also in part the story of a struggle against the very idea that the past acts as a constraint on political beliefs."
antisemitism  politics  UK 
17 days ago
The animal economists that can wheel and deal as well as any human | New Scientist Dec 2018
"As we get to know Earth’s myriad other species better, it is becoming apparent that many animals and organisms make trades, and that some are surprisingly savvy wheeler-dealers capable of manipulating the market in their own selfish interests. From frisky baboons to fish offering spa treatments on the reef, pretty much everywhere we look in nature we find evidence of surprisingly sophisticated economic decision-making. Even fungi are at it, and according to the latest studies, these brainless soil dwellers give the impression of being more rational than us."

"... over the past few years, biologists have shown that scores of animals are capable of responding to market forces, including chimpanzees, macaques, mongooses, ants, wasps and small fish called cichlids. In one of the most recently unearthed examples of a biological market, the traders don’t have brains at all. Kiers studies the underground marketplace in which mycorrhizal fungi trade phosphorus for carbon with the roots of plants."
NewScientist  economics  rationality  biology 
20 days ago
The world's great nations are revisiting the moon. But where's Europe? | New Scientist Dec 2019
"Since the beginning of the Soviet state, space travel has been associated with utopianism, exemplified by 19th-century visionary Nikolai Fedorov and his colleague Konstantin Tsiolkovsky."

"For the US, going to the moon was all about rugged, pragmatic individualism; for the Soviets, it was a parable for their communal social philosophy. This enactment of national myth is apparent in the Chinese moon programme. Chang’e is the name of a goddess who flew to the moon after she drank an elixir of immortality to stop her husband’s enemy from stealing it: a story of heroic and dutiful self-sacrifice that underlies China’s Moon Festival in the autumn. ... more recently the government has revived legends and historical figures such as Confucius to mobilise nationalist sentiment."

** Not clear to me how this is "enactment of national myth" - unless one defines myth as Merriam Webster https://www.merriam-webster.com/dictionary/myth
"2 a : a popular belief or tradition that has grown up around something or someone especially : one embodying the ideals and institutions of a society or segment of society"
NewScientist  space  utopianism  myth 
20 days ago
GPS Jamming Interferes with Construction | RNTF Feb 2019
Blog Editor’s Note: We are not sure if this is another instance of Russia jamming GPS in Norway or part of the most recent spate of instances. Suffice it to say that Russia has been jamming GPS in northern Norway a lot. This is a good article as it reminds us that GPS is about much more than making transportation more efficient and safer.
GPS  jamming  spoofing  RNTF  Norway 
20 days ago
[pdf] Next-generation networks, next-level cybersecurity problems - Positive Technologies
"In preparation for the brave new world of 5G and IoT, the last few years have seen operators make significant CapEx investments in their next-generation networks. However, despite spending billions upgrading from a protocol developed in the 70’s (ss7) to Diameter (4G and 5G), flaws exist that allow an attacker to carry out eavesdropping, tracking, fraud, theft, and worse."
networking  cybersecurity  cyber-spectrum  spectrum-vulnerability  SS7  Diameter  cellular  PositiveTechnologies 
23 days ago
SS7 vulnerabilities and attack exposure report, 2018 - Positive Technologies
Via Dale

"This report reveals the results of SS7 security analysis. Signaling System 7 (SS7) is used for exchanging data between network devices in telecommunications networks. While this standard was being developed, only fixed-line operators had access to the SS7 network, so its security was not first on the priority list. Today the signaling network is not isolated, and this allows an intruder to exploit its flaws and intercept calls and SMSs, bypass billing, steal money from mobile accounts, or affect mobile network operability."

"Although new 4G networks use another signaling system, Diameter, SS7 security issues have not been forgotten, because mobile operators should ensure 2G and 3G support and interaction between networks of different generations. Moreover, research shows that Diameter is prone to the same threats. This protocol's vulnerabilities along with possible cross-protocol attacks that use Diameter and SS7 flaws will be outlined in the next report."


"The research has shown that the level of security of mobile communication networks is still low. The overwhelming majority of networks remain vulnerable, which allows criminals to intercept subscribers' voice calls and messages, perform fraudulent operations, and disrupt service availability for subscribers."
SS7  Diameter  spectrum-vulnerability  cyber-spectrum  cybersecurity  telecoms  2G  3G  4G  PositiveTechnologies 
23 days ago
The Uber-Lyft battle pits SoftBank against Rakuten in Japan - CNBC Mar 2019
"While Uber was much bigger and carried a loftier valuation, Rakuten had a secret weapon, which informed its investment in Lyft.

A year earlier, Rakuten had acquired a company called Slice, whose technology helped consumers track their online purchases and whose data gave a window into how and where people were spending money.

With Slice, Rakuten could see that Lyft was gaining traction because it was getting a bigger share of the consumer's wallet, according to two people with knowledge of the matter who asked not to be named because the details were confidential. In other words, Lyft appeared underappreciated based on this valuable data that Rakuten owned."

"Rakuten is rapidly growing its presence in the U.S. It acquired shopping rewards company Ebates for $1 billion in 2014, and last year snapped up mobile ordering start-up Curbside. It also announced a new branch of its research institute in San Mateo last April."
CNBC  Uber  Lyft  Rakuten  transportation 
23 days ago
5G handsets are here but are the networks ready? | PolicyTracker: Feb 2019
"The mobile trade association GSMA says that LTE will continue to see strong growth in the coming years. It expects 4G to account for 60 per cent of global connections by 2025, while 5G will only make up 15 per cent of the global total during the same period."

"Building 5G networks is a huge investment, the GSMA says. Afke Schaart, Vice President and head of Europe, Russia and CIS at the association, claims that the rollout of 5G in Europe will cost €500 billion. "

“3.5 GHz with massive MIMO has better coverage than 1.8 GHz.”
5G  4G  GSMA  PolicyTracker 
25 days ago
The world’s first 6G summit | PolicyTracker: Feb 2019
“6G spectrum is still a big question mark,” said Matti Latva-aho, director of 6G Flagship, a research project at the University of Oulo, Finland. The organization is holding the world’s first 6G summit March 24-26 in Lapland, where all interested industry players and leading operators will present their views “on beyond 5G including spectrum issues.” Speakers include representatives from Nokia-Bell-Labs, Huawei, Ericsson, Samsung, NTT DoCoMo, China Telecom, Orange, the European Commission, and universities.
PolicyTracker  6G 
25 days ago
The Mirai botnet explained: How IoT devices almost brought down the internet | CSO Online Mar 2018
"On October 12, 2016, a massive distributed denial of service (DDoS) attack left much of the internet inaccessible on the U.S. east coast. The attack, which authorities initially feared was the work of a hostile nation-state, was in fact the work of the Mirai botnet.

This attack, which initially had much less grand ambitions — to make a little money off of Minecraft aficionados — grew more powerful than its creators ever dreamed possible. It's a story of unintended consequences and unexpected security threats, and it says a lot about our modern age."
IoT  cybersecurity  botnets  DDoS 
25 days ago
32 of the Best and Worst Infosec Analogies | The State of Security
the infosec industry has glommed onto a never-ending chain of analogies and metaphors to better explain the intangibles of digital security.

We can’t seem to keep them all straight, nor do we know them all. So we reached out to security influencers and asked them what their favorite and least favorite infosec analogies or metaphors were and why they loved and hated them so much. I took a little editorial liberty and squeezed in a few sayings that don’t necessarily qualify as analogies or metaphors, but I think you’ll appreciate them nonetheless.
cybersecurity  infosec  metaphors  analogies 
25 days ago
Cyber Pearl Harbor: Analogy, fear, and the framing of cyber security threats in the United States, 1991-2016 | Lawson | First Monday March 2019

"During the two and a half decades leading up to the Russian cyber attacks on the 2016 U.S. presidential election, public policy discourse about cybersecurity typically framed cybersecurity using metaphors and analogies to war and tended to focus on catastrophic doom scenarios involving cyber attacks against critical infrastructure. In this discourse, the so-called “cyber Pearl Harbor” attack was always supposedly just around the corner. Since 2016, however, many have argued that fixation on cyber Pearl Harbor-like scenarios was an inaccurate framing that left the United States looking in the wrong direction when Russia struck. This essay traces the use of the cyber Pearl Harbor analogy and metaphor over the 25-year period preceding the Russian cyber attacks of 2016. It argues that cyber Pearl Harbor has been a consistent feature of U.S. cybersecurity discourse with a largely stable meaning focused on catastrophic physical impacts. Government officials have been primarily responsible for driving these concerns with news media uncritically transmitting their claims. This is despite the fact that such claims were often ambiguous about just who might carry out such an attack and often lacked supporting evidence."
FirstMonday  metaphor  analogy  cybersecurity  war 
25 days ago
NASA's first 60 years, in pictures - CNN Style
Some 400 of the best, including a selection of lesser-known images, have been collected in the book "The NASA Archives: 60 Years in Space," a visual celebration of NASA from its inception to its near future.
Time  NASA  photography  photojournalism  history  books 
25 days ago
Is upgrading to 5G becoming a problem for wireless companies? | Fox News
" T-Mobile was hoping to unveil the country's first big-scale 5-G network at this week's Mobile World Congress in Barcelona, but the company came up short, announcing their network launch has been delayed until at least the second half of the year."

"at least a half-dozen handset makers saying they'll have phones ready for the new wireless system this year. The problem is that most of those phones aren't compatible with many of the major carriers' 5-G networks, and T-Mobile says the lack of handsets that can connect to the company's low-frequency spectrum is the cause for their delay"
FoxNews  5G  hype  T-Mobile 
25 days ago
Nixie Clocks by Millclock - FiT Feb 2019
Are you a fan of nixie clocks? Ukraine-based Millclock has produced a variety of designs, some on wood and plastic foundations while others are arranged in acrylic frames and wooden boxes. The retro clock "combines contemporary trends with technologies peculiar to Soviet Block times" using a mix of scientific flare and intricate craftsmanship. The glowing numerals, which are made of electrodes and programmed to show relevant information on the wires, are placed inside glass tubes and filled with a gas mixture consisting of argon, neon, and mercury. Each base consists of a circuit board that can be controlled via an app or its touchpad. The tubes can be purchased individually and adjusted from two to six in total so that the hours, minutes, and seconds can be displayed simultaneously.
Faith-is-Torment  clocks  time  craft  craftsmanship 
26 days ago
ToRPEDO Privacy Attack on 4G/5G Networks Affects All U.S. Carriers | Threatpost | Feb 2019
"Privacy-breaking flaws in the 4G and 5G mobile protocols could allow attackers to intercept calls, send fake amber alerts or other notifications, track location and more, according to a research team from Purdue University and the University of Iowa."

"The researchers uncovered three connected types of attacks that use this paging mechanism. The primary attack, dubbed ToRPEDO (short for TRacking via Paging mEssage DistributiOn), can be used to verify the location of a specific device. Attackers could also inject fake paging messages and mount denial-of-service (DoS) attacks, the team said.

Two other attacks enabled by ToRPEDO, the IMSI-Cracking attack and PIERCER (short for Persistent Information ExposuRe by the CorE netwoRk), allow an adversary to fully uncover the victim’s unique International Mobile Subscriber Identity (IMSI) number, if the phone number is known — opening the door to targeted user location-tracking."

"The TMSI is randomly assigned by the MME and is used to cloak the IMSI from side-channel attacks. The TMSI is supposed to change on a regular basis; however, previous sniffing attacks have been demonstrated that take advantage of the fact that this is not always the case."

"Beyond imprecise location-tracking and device status, ToRPEDO opens the door to much more serious attacks. For instance, once the attacker knows the victim’s paging occasion from ToRPEDO, the attacker can hijack the victim’s paging channel."

"Also, the researchers were able to validate that a tweet mentioning the victim’s Twitter handle triggers paging if the victim sets the Twitter app with push notifications on. This allows the attacker to associate a Twitter persona with a specific phone and phone number – and this likely extends to other services with push notifications, allowing he or she to start building a personal profile of the victim."

"Fortunately, each of the attacks have specific inherent mitigations."

In a paper presented at Mobile World Congress in Barcelona this week, the researchers explained that the issues arise from weaknesses in the cellular paging (broadcast) protocol. They started with the fact that when a mobile device is in its idle, low-power state, it will conserve battery life partly by polling for pending services only periodically.
5G  4G  privacy  IMSI  sniffing  surveillance  cyber-spectrum  spectrum-vulnerability 
27 days ago
Opinion | The Good-Enough Life - The New York Times - Avram Alpert, Feb 2019
"The desire for greatness can be an obstacle to our own potential"

"The following essay was chosen as the winner of the Brooklyn Public Library’s 2019 Night of Philosophy Op-Ed Contest. "

It is by borrowing from D.W. Winnicott, an important figure in the development of psychoanalysis, that we get perhaps the best name for this other ethics: “the good-enough life.”


And its legacy is attested to in the poem “Famous” by Naomi Shihab Nye: “I want to be famous to shuffling men / who smile while crossing streets, / sticky children in grocery lines, / famous as the one who smiled back.”
NYTimes  opinion  advice  essays  ethics 
27 days ago
FPAs: From a Niche to a Necessity - NSR Feb 2019
"While the goalposts for the greater take-up of FPAs keep moving further out, the networks of tomorrow may set requirements that are too demanding for parabolic antennas. This in turn, pressures flat panel technology to come to fruition sooner rather than later in the hope of moving it from a niche product to a necessity. Given the state of play today, how likely is it that FPAs will serve the networks of tomorrow and star in that lead role?"

"NSR’s recently published Flat Panel Satellite Antennas, 4th Edition report considers it likely, but very challenging to get the role. The report forecasts over 1.5 million units to ship in 2028, growing at a strong CAGR of 71.2%. Mobility will continue to dominate equipment revenues, with complex capabilities keeping terminals expensive. Volume will be driven by Fixed Applications, specifically Consumer Broadband, but only if manufacturers are given more incentives to drive down prices to target the largest addressable markets."
antennas  satellite  NSR  market-research 
27 days ago
Researchers Demonstrate Serious Privacy Attacks on 4G and 5G Protocols
A group of academic researchers have revealed a design weakness in the 4G/5G protocol which can be exploited by an attacker to identify the victim's presence in a particular cell area just from the victim's soft-identity such as phone number and Twitter handle. "Any person with a little knowledge of cellular paging protocols can carry out this attack," said Syed Rafiul Hussain, one of the co-authors of the paper, told TechCrunch.

The abstract below from the paper released today called "Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information" specifies the dangers of the discovered vulnerability.
cyber-spectrum  spectrum-vulnerability  4G  5G  CircleID 
28 days ago
Smallsat Growth on Shaky Foundations - NSR Feb 2019
"While the relative simplicity and the associated low-cost architecture are enabling (the much needed) easier access to the space applications, the challenge lies in the readiness of the existing infrastructure to support this rapidly growing market."

"A market that has historically been relatively slow to develop will now experience an accelerated expansion. This is bound to put immense pressure on the existing infrastructure and the different stakeholders in the supply and value chain."


= Satellite Manufacturing Constraints - "Tier 2 and Tier 3 components such as electronic systems and subsystems are expected to create considerable bottlenecks."

= Launch Constraints - "launch segment is expected to remain one of the biggest bottlenecks of the small satellite market over the next decade"

= In-Orbit Challenges - "lack of adequate space traffic tracking and management regime"
NSR  satellite  smallsats  market-research 
5 weeks ago
Will Satellite Operators Become (Rural) Mobile Operators? - NSR, Feb 2019
"Connecting the “other 3 billion” is a recurring motto for the satcom Industry. Unfortunately, the reality is that the impact on mitigating the digital divide is still modest. Mobile is the de facto way of getting online for “the bottom of the pyramid” but here, satellite can still find enormous opportunities by complementing the gaps of terrestrial networks. Given this trend, are Wi-Fi hotspots over satellite the key way for satcom to bring the unconnected online?"

"Numerous actors in the satcom space are launching Wi-Fi hotspot offers to serve the low-end segments of the market. The addressable market for these kinds of solutions is massive given the billions living in underserved areas. According to NSR’s VSAT and Broadband Markets, 17th Edition report, Wi-Fi hotspot annual service revenues will reach $7.5 billion by 2027, representing 43% of total satellite consumer broadband revenues."

"With HTS becoming the norm, satellite broadband offers can now meet UN Broadband Commission affordability targets of 1 GB of data for less than 2% of the monthly GNI per capita"

"Today, a satellite terminal that supports double-digit Mbps with 10s of concurrent sessions combined with a Wi-Fi smallcell is below the $1,000 USD threshold, which is within the reach of local businesses."

"Selecting the right locations to set up the Wi-Fi hotspot is not trivial. It needs a reliable local microentrepreneur with appropriate technical skills to maintain the equipment and run the network. The village must be big enough with adequate disposable income to generate demand but not too large that it will shortly be targeted by terrestrial alternatives. In the same line, the hotspot should be far enough from terrestrial alternatives to avoid being cannibalized by terrestrial solutions, but penetration of mobile devices is crucial to ensure customers can access the network."
NSR  satellite  rural  Wi-Fi  hotspots  broadband  HTS 
5 weeks ago
Cryptominers Infected 10x More Organizations Than Ransomware in 2018 - CircleID, Feb 2019
A new security report reveals cryptominers infected ten times more organizations than ransomware in 2018, but only one in five IT security professionals were aware their company's networks had been infected by mining malware.
cybersecurity  CircleID  cryptomining 
5 weeks ago
« earlier      
* ** *** 5g advertising afrikaans ai analysysmason animation antennas apple architecture arstechnica art astronomy at&t auctions audio automation aviation blogs books broadband buddhism business cellular china cognition commerce communications community complexity computing copyright csmonitor culture cybersecurity design development-assistance dod drones dtv economics education employment energy enforcement ethics eu europe evolution ex faa facebook faith-is-torment fcc fiercewireless filetype:pdf finance fonts games geography google governance government gps hacking hardproblems health healthcare history howto humor hunger ieee-spectrum images innovation interference internet interviews investing iot ipr itu itu-r jamming japan language law lectures legislation leo lightsquared lte lte-u maps maths media media:document meditation metaphor microsoft mmwave mobile movies music naturejournal networking neuroscience news newscientist ngso npr nsr ntia nytimes ofcom opinion parody patents people philosophy photography physics podcasts poetry policy policytracker politics poverty prison privacy profile programming psychology quotations radio recipes reference regulation religion research resources reviews rf risk risk-assessment satellite satire science sdr search security socialmedia socialnetworks software south-africa space spacenews spectrum standards statistics stories surveillance technology techstuff theeconomist theguardian tips tools toread travel trends tutorial tv twitter typography uas uk unlicensed us usa verizon via via:digg via:economist via:gmsv via:peterhaynes viasatellite video vimeo vipassana visualization war web whitespaces wi-fi windows wireless words writing wsj x:wsj youtube

Copy this bookmark: