More stories

  • in

    AWS wins deal to store UK spy agencies' work, brings AI to the table

    Intelligence agency GCHQ has signed a deal with Amazon Web Services (AWS) to host classified material and boost the use of artificial intelligence for espionage purposes. Although the procurement of cloud infrastructure from AWS was signed off by GCHQ, it will also be used by sister spy services MI5 and MI6, and the Ministry of Defence during joint operations, according to the Financial Times. 

    ZDNet Recommends

    The deal had not been made public and was signed earlier this year, according to the report. It is worth £500m to £1bn over the next decade, FT sources said. SEE: These stealthy hackers avoid Windows but target Linux as they look to steal phone dataIn a February opinion piece for the Financial Times, GCHQ director Jeremy Fleming said that the agencies “expect AI to be at the heart of this transformation and we want to be transparent about its use.”So-called “good AI” would allow “analysts to deal with ever increasing volumes and complexity of data, improving the quality and speed of decision-making.”This could include identifying and countering troll farms peddling fake news, as well as tracking networks that traffic people, drugs or weapons, Fleming noted.

    AWS has a range of AI-powered tools, including its controversial Rekognition image video analysis platform, speech-to-text/text-to speech, translation and text analysis, and a secret region purpose-built for the US intelligence community. The CIA in November awarded its C2E contract to a panel of providers including Amazon, Google, IBM, Microsoft and Oracle, as FedScoop reported at the time. That contract was previously awarded solely to AWS in 2013. AWS will host GCHQ’s and its sister agencies’ top-secret information. Spooks should find it easier to share information from field locations overseas and use AWS tools like speech recognition and machine translation for faster processing of intercepted recordings. It will also gives spies the tools to run faster searches on each others’ databases.SEE: Ransomware: Industrial services top the hit list – but cyber criminals are diversifyingCiaran Martin, the former head of the GCHQ’s National Cyber Security Centre, said the deal with AWS was “not about collecting or hoarding more data,” but was to “use existing large amounts of data more effectively”.Selecting a US cloud provider raises some questions about the UK’s digital sovereignty. FT sources said GCHQ initially sought a UK provider but couldn’t find a domestic player with the required scale or capabilities.  More

  • in

    Boost your intermediate-level tech skills with networking training for just $20

    StackCommerce
    Time seems to speed up as we reach the end of the year, so it’s not too early to think about your goals for 2022. If switching to a new, more lucrative career is one of them, now would be a great time to start training for it. The CompTIA Network+ Certification Training Course is perfect if you already have intermediate-level tech skills, since it prepares you for an exam that — when passed — gives you a new certification that’s sure to make your resume stand out.

    ZDNet Academy

    The vendor-neutral CompTIA Network+ certification is internationally recognized as proof that you have the skills required for installing, maintaining, and troubleshooting computer networks — regardless of the platform. In 65 lectures across 19 hours, you will learn all aspects of how to create and maintain a network, including both practical and conceptual skills.You’ll discover how to design a resilient network and segment its traffic, using devices like switches and routers. You will also learn how to identify the advantages and disadvantages of an existing network configuration. By the course’s end, you’ll know how to implement network security, protocols, and standards.GreyCampus, a respected e-learning platform, created this course. And students have been more than satisfied with it, awarding the course a 4.5 out of 5-star rating.If there is any chance you’ll be accessing this course over public networks, you should make sure that you’ve got access to powerful VPN protection. In fact, you should really have that any time you are online.Don’t miss this chance to become a computer networking expert, grab The CompTIA Network+ Certification Training Course while it’s on sale for only $19.99.

    More ZDNet Academy Deals More

  • in

    Ransomware has proliferated because it's 'largely uncontested', says GCHQ boss

    GCHQ director Sir Jeremy Fleming.
    Image: Getty
    If you’ve wondered why ransomware has proliferated in recent years, it’s because until recently it has remained unchallenged, according to Sir Jeremy Fleming, director of British signals intelligence agency GCHQ. “We’ve seen twice as many [ransomware] attacks this year as last year in the UK – but the reason it is proliferating is because it works,” Fleming told the US Cipher Brief threat conference.

    ZDNet Recommends

    “It just pays. Criminals are making very good money from it and are often feeling that that’s largely uncontested…we’ve got to get our head around what this means and we have up until quite recently left a lot of this playing space to those criminal actors in effect to proliferate and to make a lot of money.” SEE: Ransomware: Industrial services top the hit list – but cyber criminals are diversifying Last month, the UK launched the National Cyber Force (NCF), a group with offensive capabilities that unites personnel from the Ministry of Defence (MoD), GCHQ, the Secret Intelligence Service (MI6), and the Defence Science and Technology Laboratory (DSTL). Despite its cyber-offensive capabilities, referring to the NCF, Fleming insisted that “the UK is not building a cyber warfare centre”.  “There’s real danger, I think, in over-militarising, with due respect to all of my military colleagues on both sides of the pond,” Fleming said. However, he added: “There is a place for western democratic liberal nations…to be able to contest cyberspace, and in the UK we’ve been doing that for decades.

    “That’s been part of GCHQ’s mission for decades and we need our policymakers and, in some aspects of the mission, our military leaders to be able to bring cyber capabilities into play.” The way to address ransomware profits is through regulating and controlling cryptocurrencies, Fleming suggested.  “I can see in the policy debate on the US side and I see the policy debate here, and you quite quickly get into the ways in which criminals profit — you quite quickly get into cryptocurrencies and how those are regulated and controlled,” he said. While most countries back the idea of disrupting ransomware operators and the overall business model, some have developed policy that makes an exception for ransomware attacks on critical infrastructure.  SEE: Ransomware: Looking for weaknesses in your own network is key to stopping attacks The Netherlands minister of foreign affairs, Ben Knapen, recently outlined how its Defense Cyber Command “can carry out a counter-attack at the end of the day to avert an enemy action or to protect an essential interest of the state”. However, the minister said it normally resorts to diplomatic or legal channels.   At US President Joe Biden’s recent cybersecurity summit with 30 countries, participating nations agreed to cooperate to target the abuse of financial mechanisms to launder ransom payments or conduct other activities that make ransomware profitable. They will also aim to disrupt the ransomware ecosystem via law enforcement collaboration to investigate and prosecute ransomware actors. Safe havens for ransomware criminals would be addressed, along with continued diplomatic engagement. There’s suspicion in the US that Russia turns a blind eye to ransomware gangs operating in its territory. Following the ransomware attack on Colonial Pipeline last year, Biden said he warned Russian President Vladimir Putin that critical infrastructure should be off limits. More

  • in

    Watch these autonomous drones zip through the woods

    University of Zurich
    Expert human drone pilots have proven incredibly adept at piloting UAV through complex courses at high speeds which are still unmatched by autonomous systems. But researchers at the University of Zurich and Intel Labs are collaborating to change that, and their work, recently presented in the journal Science Robotics, could have far-reaching implications for the future of commercial drones.”Autonomous navigation in environments where conditions are constantly changing is restricted to very low speeds,” explains Matthias Müller, Lead of Embodied AI Lab at Intel Labs. “This makes drones unable to operate efficiently in real-world situations where something unexpected may block their path and time matters.”That’s obviously a big impediment to safely rolling out drones for commercial use. The solution seems to be harnessing the decision-making abilities of expert pilots to train drones to function autonomously.”In partnership with the University of Zurich, we were able to show how a drone trained exclusively in simulation by imitating an expert pilot is able to perform in challenging real-world scenarios and environments that weren’t used during the training of the convolutional network,” says Müller. “The trained autonomous drone was able to fly through previously unseen environments, such as forests, buildings and trains, keeping speeds up to 40 km/h, without crashing into trees, walls or any other obstacles – all while relying only on its onboard cameras and computation.”The results were achieved by having the drone’s neural network learn from a simulated expert pilot that flew a virtual drone through a simulated environment full of complex obstacles. The expert had access to the full 3D environment while the drone’s neural network only had access to the camera observations with realistic sensor noise and imperfect state estimation. That input imbalance (what researchers call a “privileged expert”) forced the drone to learn to act with exceptional dexterity in less than ideal conditions. The quadrotor demonstrated a decrease in the latency between perception and action while simultaneously demonstrating resiliency in the face of perception artifacts, such as motion blur, missing data, and sensor noise.

    [embedded content]

    “Existing systems use sensor data to create a map of the environment and then plan trajectories within the map – these steps require time and errors compound, making it impossible for the drones to fly at high speeds,” says Müller. “Unlike current systems, future drones could learn navigation end-to-end in a simulated environment before going out into the real-world. This research shows significant promise in deploying these new systems in a wide array of scenarios including disaster relief, construction sites, search and rescue, agriculture and logistics, and more.”

    One of the benefits of this system is its applicability to a wide variety of real-world environments. The approach demonstrated in the research involved experiments that tested in a set of human-made environments (e.g. simulated disaster zone and urban city streets) and also diverse natural environments (forests of different types and densities and steep snowy mountain terrains). Future application areas for the technology could be disaster relief scenarios, construction sites, search and rescue, agriculture and logistics, and delivery. More

  • in

    Nearly all US execs have experienced a cybersecurity threat, but some say there's still no plan

    A new survey suggests the majority of US executives have encountered a cybersecurity incident but this has not translated into the creation of incident response plans.

    On Tuesday, Deloitte published the results of a new survey, taking place between June 6 and August 24, 2021, which includes the responses of 577 C-suite executives worldwide (159 in the US) on today’s cybersecurity threats.  The research — including insight from those in CEO, CISO, and other leadership roles — suggests that nearly all US executives have come across at least one cybersecurity event over the past year, 98%, in comparison to 84% internationally.  The COVID-19 pandemic has led to an increase in cybersecurity incidents and it appears that the event rate may disproportionately have impacted organizations in the United States.  According to Deloitte’s research, 86% of US executives have noticed an uptick in attack attempts, a higher climb than that experienced by 63% of leadership worldwide.  Despite the ongoing risk of cyberattacks, US enterprise firms are not up to par when it comes to implementing defense and incident response initiatives. In total, 14% of US executives have no such plans, in comparison to 6% of non-US executives.  Problems including data management issues, infrastructure complexities, failures to keep up with technological advances, and missteps in prioritizing cybersecurity are all cited as challenges in coming up with workable cybersecurity plans. 

    Over 2021, incidents including the Microsoft Exchange Server hacking wave, the ransomware incidents at JBS and Colonial Pipeline, and the DDoS attack against KT have highlighted the severe business disruption caused by successful attacks.  Of interest is that rather than malware, phishing, or data breaches being a top concern, 27% of executives said they were most worried about the actions of “well-meaning” employees who may inadvertently create avenues for attackers to exploit.  However, only 41% of organizations say they have implemented solutions to track and monitor the risk factors associated with staff access and behavior.  The research suggests that the common consequences experienced by today’s firms after an incident include disruption (28%), a drop in share value (24%), intellectual property theft (22%), and damage to reputation that prompts a loss in customer trust (22%).  In addition, in 23% of cases, a cyberattack can lead to a change in leadership roles. “No CISO or CSO ever wants to tell organizational stakeholders that efforts to manage cyber risk aren’t keeping up with the speed of digital transformations made, or bad actors’ improving tactics,” commented Deborah Golden, Deloitte Risk & Financial Advisory Cyber and Strategic Risk leader and principal. “Aggressive organizational digital transformations and continued remote work for some seem to be shining more of a spotlight on the human side of cyber events — both the cyber talent gap and the potential risk well-meaning employees can pose. We see leading organizations turning to advanced technologies to help bridge those gaps.”
    Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Third-party data breach in Singapore hits healthcare provider

    Another third-party security breach has been reported in Singapore, this time, affecting patients of Fullerton Health and compromising personal data that included bank account details in “a few cases”. The affected vendor Agape Connecting People, which platform facilitates appointment booking, first detected the breach on October 19 and appeared to affect only Fullerton Health.  The healthcare services provider said none of its own IT systems, network, and databases were impacted by the breach. It filed reports with both the police and Personal Data Protection Commission, which oversees Singapore’s Personal Data Protection Act.  Agape first detected the intrusion on October 19 and “acted immediately” to isolate and suspend use of the system, the vendor said in a statement Monday.  “None of our core infrastructure has been compromised,” it said, adding that the breach “appears” to be limited to Fullerton Health. However, it noted that it still was in the process of confirming that no other clients were affected. 

    Describing itself as a social enterprise, Agape operates a contact centre to provide employment for the disadvantage, including inmates, physically disabled, ex-offenders, and single mothers. It has a capacity of more than 250 seats and aims to support 1,000 disadvantaged individuals by 2022. Agape said it was working with cybersecurity experts to implement “mitigating action” to minimise further impact from the breach.  Fullerton Health said on October 21 it was alerted “a few days ago” that its customer personal data could have been exposed and initiated an investigation. It found that an unauthorised party had gained access to a server used by Agape, compromising personal data of patients with whom Agape had assisted in making appointments.

    Such details included names, identification numbers, and contact details, as well as bank account details in “a few cases” and “certain limited health-related information”. No credit card information or passwords were leaked, Fullerton Health said. The company services corporate clients and their employees, one of whom at least had been confirmed to have their personal data potentially exposed. Fullerton Health said it still was working to ascertain the number and identity of individuals affected by the breach. Digital forensic and cybersecurity professionals had been roped in to help with its investigations, the healthcare provider said, adding that they also were trying to determine the root cause and full extent of the breach. “We are conducting a thorough review of our processes and protocols relating to data security and the use of third-party service providers to further strengthen our information security,” Fullerton Health said. It said data relating to COVID-19 vaccinations carried out at its vaccination centres were not compromised, since the information had been stored separately on a system not shared with Agape.  Singapore has seen a spate of supply chain attacks this past year that compromised personal data of, amongst others, 580,000 Singapore Airlines (SIA) frequent flyers, 129,000 Singtel customers, and 30,000 individuals in an incident involving job-matching organisation e2i.  The Singapore Computer Emergency Response Team (SingCERT) last year handled 9,080 cases, up from 8,491 the year before and 4,977 in 2018, with marked increases in ransomware, online scams, ad COVID-19 phishing activities, revealed a July 2021 report released by Cyber Security Agency of Singapore (CSA). The number of reported ransomware attacks saw a significant spike of 154% in 2020, with 89 incidents, compared to 35 in 2019. These mostly affected small and midsize businesses (SMBs) in various sectors including manufacturing, retail, and healthcare.  RELATED COVERAGE More

  • in

    Schools put the brakes on facial recognition scheme for kids buying lunch

    Schools in the United Kingdom have paused the rollout of facial recognition scans in cafeterias following backlash from data watchdogs and privacy advocates.

    Last week, the Information Commissioner’s Office (ICO), the UK’s data and privacy regulator, intervened after nine schools in North Ayrshire, Scotland, began scanning student faces to take payment for school lunches. At the time, more schools were expected to follow suit. The scheme was defended as a cashless, quick, and contactless means of payment in light of COVID-19.  However, the ICO and privacy outfits were quick to note that in a time where law enforcement is roundly criticized for using the same technology on the streets, introducing it in schools may be unnecessary.  Big Brother Watch director Silkie Carlo said: “It’s normalizing biometric identity checks for something that is mundane. You don’t need to resort to airport-style [technology] for children getting their lunch.” The ICO told The Guardian that the organization would contact North Ayrshire council to talk about data protection laws concerning minors and to see if a “less intrusive” payment option was available.  This could include contactless payment on cards or fingerprint readers, the former of which is widely used in the United Kingdom. 

    As reported by the BBC, the local council has “temporarily paused” the program, while one of the schools has completely closed down the scheme.  “Whilst we are confident the new facial recognition system is operating as planned, we felt it prudent to revert to the previous PIN (personal identification number) system while we consider the inquiries received,” the North Ayrshire Council tweeted.  One of the companies named as involved in the rollout, CRB Cunninghams, describes the technology as “a contactless biometric method that enhances the speed of service and retains the security of fingerprints.” In other facial recognition news, several weeks ago, the European Parliament voted in favor of a resolution barring law enforcement in the region from using facial recognition technologies. While not legally binding, the parliamentary body is currently working on rules to rein in the use of facial recognition and artificial intelligence (AI) across both the public and private sectors.  ZDNet has reached out to CRB Cunninghams for comment.  Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Mozilla Firefox cracks down on malicious add-ons used by 455,000 users

    Mozilla’s Firefox browser team has cracked down on malicious add-ons, blocking software with a 455,000 user base. 

    On October 25, the development team said that in early June, Firefox discovered add-ons that were misusing the browser’s proxy API, used by software to manage how the browser connects to the internet. Add-ons are software modules that can be installed to customize a user’s browsing experience and may include anti-tracking software, ad blockers, themes, and utilities.  However, they may also become a conduit for malicious purposes, such as data theft or eavesdropping, a challenge faced by all browser developers.  According to Mozilla, the add-ons removed in the sweep tampered with the browser’s update functionality; in particular, users were unable to download updates, access updated blocklists, or update remotely configured Firefox content.  The add-ons have been blocked, and approval was temporarily paused for new add-on developer submissions when the proxy API was in use to create and deploy a fix.  Firefox, starting with v.91.1, now also includes changes to harden the update process. A fallback mechanism to direct connections for update purposes and other “important requests” made by the browser has been implemented, allowing downloads to take place whether or not a proxy configuration causes connection issues. 

    The system add-on, “Proxy Failover,” has been deployed to Firefox users.  Mozilla released Firefox version 93 at the beginning of October. The latest build includes a new tab unloading feature, the ability to block HTTP downloads from HTTPS web pages, and the end of default support for 3DES encryption.  Mozilla has urged users to make sure their Firefox version is up to date. Developers making use of the proxy API are being asked to start including the code “browser_specific_settings “: {   “gecko”: {     “strict_min_version”: “91.1”   }  } in their add-ons to expedite future reviews.  “We take user security very seriously at Mozilla,” the team says. “Our add-on submission process includes automated and manual reviews that we continue to evolve and improve in order to protect Firefox users.” Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More