More stories

  • in

    Cloud service and government driving MacTel as Sprint returns to profit

    Image: Macquarie Telecom
    Macquarie Telecom has reported its seventh straight year of increasing earnings before interest, tax, depreciation, and amortisation (EBITDA) on Wednesday, with the company seeing the figure increase 13% to AU$74 million, and revenue increasing 7% to AU$285 million. The increases were driven by MacTel’s cloud services and government segment, which saw revenue increase 21% to AU$131.5 million and EBITDA jump 25% to AU$36 million. Data centres contributed AU$39 million in revenue, up 10%, and had a 12% increase in EBITDA to AU$19 million. MacTel’s traditional telecom sector experienced drops in sales and profitability, with revenue down 3% to AU$135 million and EBITDA down by the same percentage to AU$18.5 million. The company said this was due to pandemic restrictions which limit office-based connectivity. All up, due to a 28% boost in depreciation and amortisation, the telco reported a 7% drop in net profit to AU$12.5 million. Responding to demand, the company said it would be investing in its cybersecurity arm as well as staffing and technology for its data centres. Last month, the company announced it would be spending AU$78 million to build the core and shell of its new 32-megawatt Intellicentre 3 Super West facility based at its Macquarie Park Data Centre Campus. The new facility will also be home to a new Sovereign Cyber Security Centre of Excellence, which according to the company, will be responsible for monitoring and managing cybersecurity events around the clock. An initial 31 cyber specialists are expected to run and operate the centre by 2024.

    See also: Best internet provider in Australia 2021: Top ISPsSprint Technology Solutions also reported its yearly result on Wednesday, and after another year of acquisitions said it had transformed from a small ISP into a full service technology company. For the full year to June 30, revenue tripled to AU$104 million, EBITDA saw an almost four-fold increase to AU$8.6 million, and its net profit bounced from a AU$1.5 million loss to AU$1.16 million profit. “Of the 13 most recent acquisitions, Spirit has successfully integrated 10 of 13 companies into the standard operating environment,” Spirit managing director Sol Lukatsky said. “Spirit sits in the desirable position to participate actively in further industry consolidation across either of the IT and telco markets.” As it moves to being a pure enterprise player, Spirit said it received multiple bids for its consumer assets. “During the process, a group of potential acquirers of the consumer assets have enquired about the possible sale of additional infrastructure assets which Spirit may consider non-core,” the company said. “The Spirit board is considering these requests and has appointed an advisor to review its options.” Elsewhere, MNF Group reported it saw revenue rise 12% to AU$113 million and EBITDA increase 13% to AU$43 million. “I’m particularly proud of the progress we have made against our strategy during the year, as we build MNF into a world-class software company,” CEO René Sugo said. “We completed the divestment of parts of our direct business, aligning our business to wholesale revenue and the multi-billion-dollar opportunity we see ahead of us.” MNF said it was restructuring into three segments consisting of communications platform as a service, telecom as a service, and unified communications as a service. Related Coverage More

  • in

    New satellite system could improve Australia's water quality management

    Image: Getty Images
    An analysis carried out by the University of New South Wales (UNSW) Canberra has demonstrated that a new satellite system could potentially improve how Australia’s coastal and inland waterbodies are monitored and managed.The study was carried out on behalf of the Commonwealth Scientific and Industrial Research Organisation (CSIRO) and the SmartSat Cooperative Research Centre (CRC) at the Australian National Concurrent Design Facility (ANCDF). It forms part of the CSIRO’s Aqua Australia mission, which was established last year to develop and roll out a national water quality monitoring system that could deliver real-time updates, predictive analytics, and forecast warnings to water managers.According to the Preliminary Concept Study for the Satellite Segment of AquaWatch Australia report [PDF], the satellite system could include a constellation of small Earth observation satellites featuring high-resolution imaging cameras, which can capture precise and detailed data that could be used to detect water body content, plus a network of ground-based sensors.”We were able to identify a system design that addresses those requirements and is feasible to construct, commission, and operate,” ANCDF manager and space systems engineer Denis Naughton said.”The consolidated technical solution for the operational AquaWatch satellites would require further detailed engineering analyses of the mission.”The analysis added that gathered data from space could provide insight about water quality and natural events including toxic algal blooms, the contamination of drinking water, and excess runoff from irrigation. This is in comparison to existing Earth observation satellites that can only provide 60-70% coverage of Australia’s major water bodies. “The outcomes could lead to a step-change in Australia’s national water quality information delivery, supporting decision makers in water agencies, local communities, water utilities, and commercial water users to provide safe drinking water, regulate contamination events, and monitor water quality across primary industry and assist with management of aquaculture farms, reef structures and our coastal environs,” SmartSat CRC’s CEO Andy Koronios said.

    The report will now be used to inform the upcoming Australian Space Agency’s Earth Observations from Space Technology Roadmap.”This preliminary system design report will underpin our approach to establishing the integrated space and ground infrastructure, and inform our analysis of domestic technical capability to build such purpose-designed Earth observation satellites,” CSIRO’s AquaWatch Australia mission leader Dr Alex Held added. “This will help drive the development of local advanced manufacturing, support the growth in Earth observation data analysis, modelling and applications.”In other satellite news, Queensland-based Gilmour Space Technologies has signed a series of small satellite launch agreements with Exolaunch, a Berlin-based firm that specialises in rideshare launch and deployment services for small satellites.Under the agreements, Gilmour will gain access to Exolaunch’s small satellite deployment technologies and in-space transportation services, while Exolaunch will have access to Gilmour’s low-inclination missions and orbits using Eris, a hybrid launch vehicle developed by Gilmour.Related Coverage More

  • in

    Australia's 'hacking' Bill passes the Senate after House made 60 amendments

    Image: ACT Policing
    Two Australian law enforcement bodies will soon have the power to modify, add, copy, or delete data, after the Bill allowing such activity was waved through the Senate on Wednesday morning.The Surveillance Legislation Amendment (Identify and Disrupt) Bill 2020, now awaiting Royal Assent, hands the Australian Federal Police (AFP) and the Australian Criminal Intelligence Commission (ACIC) three new powers for dealing with online crime.The first of the warrants is a data disruption one, touted as a way to prevent “continuation of criminal activity by participants, and be the safest and most expedient option where those participants are in unknown locations or acting under anonymous or false identities”. This warrant gives the cops the ability to “disrupt data” by modifying, copying, adding, or deleting it.Failure to comply could land an individual with 10 years of imprisonment.The second is a network activity warrant that would allow the AFP and ACIC to collect intelligence from devices or networks that are used, or likely to be used, by those subject to the warrant. The last warrant is an account takeover warrant that will allow the agencies to take control of an online account for the purposes of gathering information for an investigation. The Parliamentary Joint Committee on Intelligence and Security (PJCIS) recommended the passage of the so-called “hacking” Bill earlier this month, provided that its 33 other recommendations were met. Shadow Minister for Home Affairs Kristina Keneally confirmed in the Senate on Wednesday the government has implemented “wholly or substantially” 23 of the 33 recommendations through legislative amendments or changes to the Bill’s explanatory memorandum.

    These include strengthening the issuing criteria for warrants, including considerations for privacy, public interest, privileged and journalistic information, and financial impacts; reviews by the ISLM and the PJCIS; sunset powers in five years; and good-faith immunity provisions for assistance orders. Of the other 10 PJCIS recommendations, four have been accepted by the government and will be incorporated into its response to the national security legislation review. The House of Representatives on Tuesday passed the Bill, with a total of 60 amendments, and while Labor has thrown its support behind the Bill as a result of the amended document being a “better Bill”, the Australian Greens have not. “Unsurprisingly, the two major parties are in complete lockstep with each other and are leading us down the road to a surveillance state,” Greens Senator Lidia Thorpe said.”In effect, this Bill would allow spy agencies to modify, copy, or delete your data with a data disruption warrant; collect intelligence on your online activities with a network activity warrant; also they can take over your social media and other online accounts and profiles with an account takeover warrant.”What’s worse, the data disruption and network activity warrant could be issued by a member of the Administrative Appeals Tribunal — really? It is outrageous that these warrants won’t come from a judge of a superior court.” She said it was not clear that these warrants were even needed, noting the Bill “does not clearly identify a gap in existing powers”.”The scope of the new powers is disproportionate compared to the threats of serious and organised cybercrime to which they are directed,” she said.”There is a lack of evidence justifying the need for warrants of this nature, beyond those already available … no other country in the Five Eyes alliance has conferred powers on its law enforcement agency that this Bill will.”The Bill is now awaiting Royal Assent.MORE ON THE BILL More

  • in

    NSO Group facing renewed backlash after helping repressive Bahraini Government hack iPhones of politicians, activists

    A new report from Citizen Lab has revealed that the controversial NSO Group supplied surveillance tools to the perennially repressive government of Bahrain between June 2020 and February 2021.The company has faced withering backlash since it was revealed that they helped dozens of organizations spy on world leaders, activists, journalists and others using the Pegasus spyware.The latest report from Citizen Lab — authored by Ali Abdulemam, Noura Al-Jizawi, Bill Marczak, Siena Anstis, Kristin Berdan, John Scott-Railton and Ron Deibert — said nine activists from Bahrain had their iPhones hacked with NSO Group’s spyware, and some were attacked through zero-click iMessage exploits.

    Both the 2020 KISMET exploit and the 2021 FORCEDENTRY exploit were used by the Bahraini government to hack into the phones of local human rights activists, political groups, a politician and even Bahraini dissidents living in London. “At least four of the activists were hacked by LULU, a Pegasus operator that we attribute with high confidence to the government of Bahrain, a well-known abuser of spyware. One of the activists was hacked in 2020 several hours after they revealed during an interview that their phone was hacked with Pegasus in 2019,” the report’s authors said. “Two of the hacked activists now reside in London, and at least one was in London when they were hacked. In our research, we have only ever seen the Bahrain government spying in Bahrain and Qatar using Pegasus; never in Europe.” The report notes that the activist in London may have actually been hacked by another Pegasus operator who then passed the information on to the Bahraini government. A list of those targeted by the government of Bahrain.
    Citizen Lab

    Citizen Lab coordinated with Forbidden Stories — the organization that revealed NSO Group’s work — and confirmed that at least five of the devices hacked into by the Bahraini government were contained on the Pegasus Project’s list of potential targets of NSO Group’s customers.Bahrain is a dictatorship that has long crushed dissent and deployed draconian measures to control public discussion online, blackmail government opponents, torture activists and commit other human rights violations. The report notes that other Western technology companies have in the past faced backlash for helping Bahrain’s government censor the internet, disrupt protests and monitor opponents both inside Bahrain and outside of the country. Canadian company Netsweeper is used by Bahrain to block many websites for Bahraini citizens and the Ministry of Interior’s Cyber Crime Unit, alongside other government arms, have bought spyware from FinFisher, Verint Systems, Cellebrite, Hacking Team, Trovicor GmbH and NSO Group, according to the report. Citizen Lab researchers discovered that Bahrain’s government first bought the Pegasus spyware in 2017 and began using it in Bahrain and Qatar. The organization saw a spike in usage of Pegasus in July 2020 and coordinated with targets of the government to analyze how they were targeted and how their phones had been hacked. Moosa Abd-Ali and Yusuf Al-Jamri, two Bahraini activists living outside of Bahrain, agreed to be named in the report but the others who had their phones hacked only wanted to be identified by the organizations they worked for. Abd-Ali stood out in the report because he previously took FinFisher to court after Bahraini officials used the company’s spyware to hack into his computer in 2011. His iPhone 8 was hacked sometime before September 2020. The report explained that officials tried a number of ways to hack into phones, even using fake DHL package tracking notifications that Citizen Lab traced back to a Bahraini government operator of Pegasus. Sometimes government operators used the zero-click exploit and in other instances it required one or two clicks on links to infect a device with the spyware. “We noted that these three domains were hosted on shared web hosting providers. In other words, the IP addresses that they pointed to had dozens of other innocuous domains also pointing to them. In previous iterations of NSO Group’s Pegasus infrastructure, each domain name pointed to a separate IP address,” the researchers found. The government has taken extreme measures to curtail dissent and diminish the influence of activists or protest leaders for decades but efforts have taken a technological turn in recent years, particularly since the Arab Spring protests began around 2010. The government violently put down the nascent protest movement in 2011, arresting and torturing hundreds of Bahrainis. Citizen Lab has been monitoring the government’s use of spyware for years, tracking their use of ProxySG devices and PacketShaper devices as well as Internet-filtering technology produced by Netsweeper, Inc. The government eventually bought spyware tools from former Nokia Siemens Networks affiliate Trovicor GmbH in 2011, according to Bloomberg. In one notable instance, the government used spyware from FinFisher, a UK-German company, to blackmail a well-known Bahraini lawyer. Government officials hacked into his computer and then sent him a CD threatening to release an intimate video of him and his wife if he did not stop defending human rights activists. The video had been obtained through a hidden camera that had been secretly planted in his home. The government eventually did release the video to the public after the lawyer refused to back down. Members of the government also have been accused of using other tools to deanonymizing pseudonymous Twitter accounts critical of the government. 

    The researchers behind the report said it shows that the NSO Group’s repeated claims of innocence and human rights work fly in the face of the reality that their tools are used by dictatorships. “Despite a half-decade of being implicated in human rights abuses, NSO Group regularly claims that they are, in fact, committed to protecting human rights. However, this purported concern is contradicted by a growing mountain of evidence that its spyware is used by authoritarian regimes against human rights activists, journalists, and other members of civil society,” the report said.  “While NSO Group regularly attempts to discredit reports of abuse, their customer list includes many notorious misusers of surveillance technology. The sale of Pegasus to Bahrain is particularly egregious, considering that there is significant, longstanding, and documented evidence of Bahrain’s serial misuse of surveillance products including Trovicor, FinFisher, Cellebrite, and, now, NSO Group.”The researchers called the Bahraini government’s abuse of the spyware “predictable” and said it was “gross negligence in the name of profit” by NSO Group to sell the tool to a government with Bahrain’s human rights record. While the report said the victims of the hack may have been able to protect their devices by disabling iMessage and FaceTime, it notes that the NSO Group has found other ways to deliver malware through other messaging apps like WhatsApp. Experts, like Comparitech privacy advocate Paul Bischoff, said the report was further evidence that there is no real legitimate use for NSO Group’s malware.”Those authorities would not have the same spying capabilities without NSO Group,” Bischoff told ZDNet. “We should immediately declare an international moratorium on private sales of spyware.”  More

  • in

    B. Braun updates faulty IV pump after McAfee discovers vulnerability allowing attackers to change doses

    McAfee Enterprise’s Advanced Threat Research Team has unveiled a new study about vulnerabilities they found with pumps created by German healthcare giant B. Braun.The report chronicles the problems with B. Braun’s Infusomat Space Large Volume Pump and the SpaceStation, both of which are built to be used in adult and pediatric medical facilities. Infusion pumps are designed to help nurses and doctors skip time-consuming manual infusions and have gained prominence in recent years as many hospitals digitize their systems.  According to the study, attackers could take advantage of the vulnerabilities to change how a pump is configured in standby mode, allowing altered doses of medication to be delivered to patients without any checks. The OS of the pump does not check where the commands it gets are from or who is sending data to it, giving cyberattackers space to attack remotely. The use of unauthenticated and unencrypted protocols also gives attackers multiple avenues to gain access to the pump’s internal systems that regulate how much of each drug needs to go to a patient. “Malicious actors could leverage multiple 0-day vulnerabilities to threaten multiple critical attack scenarios, which can dramatically increase the rate of medication being dispensed to patients. Medical facilities should actively monitor these threats with special attention, until a comprehensive suite of patches is produced and effectively adopted by B. Braun customers,* McAfee’s Advanced Threat Research Team said in the study. “Through ongoing dialogue with B. Braun, McAfee Enterprise ATR disclosed the vulnerability and have learned that the latest version of the pump removes the initial network vector of the attack chain.”Douglas McKee, Steve Povolny and Philippe Laulheret — members of McAfee’s Advanced Threat Research Team — explain in the report that the changes to the amount of medication given to a patient would look like a simple device malfunction and would “be noticed only after a substantial amount of drug has been dispensed to a patient, since the infusion pump displays exactly what was prescribed, all while dispensing potentially lethal doses of medication.” 

    McAfee noted that there are more than 200 million IV infusions administered globally each year using pumps like the ones supplied by B. Braun. The company is one of the leaders in an IV pump market that brought in $13.5 billion in 2020 in the US. Shaun Nordeck, a doctor working at a Level 1 Trauma Center, contributed to the study and said the ability to remotely manipulate medical equipment undetected, with potential for patient harm, is effectively weaponizing these point of care devices. “This is a scenario previously only plausible in Hollywood, yet now confirmed to be a real attack vector on a critical piece of equipment we use daily,” Nordeck said of the study. “The ransomware attacks that have targeted our industry rely on vulnerabilities just like these; and is exactly why this research is critical to understanding and thwarting attacks proactively.”McAfee informed B. Braun of the vulnerabilities in January and the company has since updated the pumps to solve the problem. But the emergence of the issue opens up an entirely new slate of attacks that could be leveraged if other network-based vulnerabilities are found. The report notes that even though B. Braun has fixed the problems, many hospitals are still running the vulnerable tools and software. “The medical industry has lagged severely behind others in the realm of security for many years — it’s time throw away the digital ‘band-aids’ of slow and reactive patching, and embrace a holistic ‘cure’ through a security-first mindset from the early stages of development, combined with a rapid and effective patch solution,” McKee, Povolny and Laulheret said. McAfee ended up discovering five separate, new vulnerabilities related to the pumps — CVE-2021-33886, CVE-2021-33885, CVE-2021-33882, CVE-2021-33883 and CVE-2021-33884 — which cover B. Braun’s Infusomat Large Volume Pump Model 871305U, a SpaceStation Model 8713142U docking station that holds up to 4 pumps and a software component called SpaceCom version 012U000050, all of which were released in 2017. “When looking at how the pump and its communication module handles communication and file handling, we observed that critical files are not signed (CVE-2021-33885), most of the data exchanges are done in plain-text (CVE-2021-33883), and there is an overall lack of authentication (CVE-2021-33882) for the proprietary protocols being used,” the report said.Security researchers have previously discovered cybersecurity vulnerabilities with infusion pumps from multiple companies besides B. Braun like Medtronic, Hospira Symbiq and others. But recently the German government released a study on infusion pumps, including those from B. Braun, as part of a larger examination of medical device cybersecurity. “SpaceCom is an embedded Linux system that can run either on the pump from within its smart-battery pack or from inside the SpaceStation. However, when the pump is plugged into the SpaceStation, the pump’s SpaceCom gets disabled,” the study found. “SpaceCom acts as the external communication module for the system and is separated from the pump’s internal operations, regardless of where it is running from. An important function of SpaceCom is to be able to update the drug library and pump configuration stored on the pump. The drug library contains information such as ward and department, a list of pre-configured drugs with their default concentrations, information messages to be printed on the screen when selected, and more importantly, soft, and hard limits to prevent medication error.” Part of why infusion pumps are so widely used now is because they help nurses regulate doses of drugs automatically, with some systems deploying databases with more than 1500 key/value pairs. One difficulty that cyberattackers may face is that the pump’s RTOS is not network connected but would need to be accessed to make any changes. “Although this attack chain presents a complete method to modify critical pump data, it is important to recognize the conditions required for this attack to be successful. These pumps are designed to be network connected to a local internal network,” the researchers explained. “Therefore, under normal operating conditions an attacker would need to have found a method to gain access to the local network. Could this attack take place over the internet? Technically speaking, yes; however, it would be very unlikely to see a setup where a pump is directly internet-connected.”There are also other measures taken by B. Braun to protect the device, including a feature that makes it so the pump ignores requests while already delivering medication, meaning the attack can only be leveraged when the pump is idle or in standby mode in between infusions. Nurses are also instructed to check the dosage and medication levels before setting anything, and regulations in multiple countries explain in detail how the device is supposed to be managed by nurses. But gaining access to local networks is not as difficult as it once was and McAfee noted that the “prerequisites for this attack are minimal and are not enough to mitigate the overall threat.” Once a local network is accessed, cybercriminals could take a number of steps to make their work easier, including clearing the current trusted server configuration and rewriting it to an attacker-controlled server.Attackers can even reboot the entire operation to make sure none of their changes are noticed by hospital staff. Nordeck, who has spent more than 20 years as a doctor in private settings and in the US Army, said ICU’s are high-pressure environments where there is an increased risk for infusion errors since these critical and often medically complex patients have multiple infusions which are being adjusted frequently. “Errors, however, are not limited to the ICU and may just as easily occur in the inpatient ward or outpatient settings,” Nordeck said. “Essentially with each increase in variable (patient complexity or acuity, number of medications, rate changes, nurse to patient ratio, etc.) there is an increased risk for error.” Nordeck added that “something as routine as correcting a person’s high blood sugar or sodium level too quickly can cause the brain to swell or damage the nerves which can lead to permanent disability or even death.” While the researchers noted that ransomware attacks are far more likely right now, it was important for healthcare institutions to harden themselves against the kinds of emerging attacks that continue to pop up from time to time. “Device manufacturers clearly aim to produce safe and secure products as evidenced by built-in safeguards. However, flaws may exist which allow the device to succumb to a ransom attack or potentially cause harm,” Nordeck added. “Therefore, manufacturers should collaborate with security professionals to independently test their products to detect and correct potential threats and thereby preserve patient safety and device security.”  More

  • in

    HYCU initiative offers free evaluation for ransomware recovery prospects

    Whenever the concept of public service melds into a business initiative for an enterprise and its ecosystem, the result is usually a win-win for everybody. Data backup and recovery provider HYCU is immersed in such a project right now, and the timing couldn’t be more spot-on, because it has to do with defending against the increasing number of ransomware attacks on businesses and organizations worldwide. Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid.The Boston-based company, which specializes in multi-cloud data backup and recovery-as-a-service, on Aug. 24 announced a new free-of-charge cloud application to help organizations identify and measure their ability to effectively recover in the event of a ransomware attack. Ransomware attacks have been popping up at an alarming rate during the past 18 months. These cyberattacks are big business–so big, in fact, that research claims a business is attacked by a cybercriminal every 11 seconds, according to Cybersecurity Ventures. Damage costs from these attacks are predicted to hit $20 billion by the end of this year. For context, ransomware was merely a $325 million business in 2015–57 times less than this year’s expected loss of $20 billion.It’s important for organizations to know what to do when this day comes, and the trend says it is likely to come to most companies.Free service available via GetRScore.orgHYCU is making its R-Score (ransomware score) evaluation available as a free service directly from GetRScore.org. R-Score is the culmination of months of work from HYCU data protection and cybersecurity experts and company partners, HYCU founder and CEO Simon Taylor told ZDNet.”Ransomware and the horribly increased criminality that we saw during COVID increasingly drove board-level discussions around what companies were doing when it came to data protection,” Taylor said. “All of a sudden the CISO, CIO, CFO, and CEO were talking openly with the board of directors about their data protection practices, and about what they were going to do if and when a ransomware attack occurred. We started to look at ways that we could become more involved in supporting our customers through these tragic times. 

    “One of the things we came up with was this concept of what we call our ‘score.’ Very simply, our score concept is effectively a credit score that rates your company’s ability to recover from a ransomware attack. Our philosophy is: It’s not ‘if,’ it’s ‘when.'”The score, made available within about 10 minutes after it processes answers to its questions, is a number assigned to a company to tell management how prepared it will be to recover all its data after an attack. “So the way that I look at this is not as a commercial sales concept. This is really a true public service,” Taylor said.R-Score works similar to the way Fair and Isaac set up the FICO scoring system more than 30 years ago, Taylor said. The app uses entered data to assess an organization’s preparedness to repel and recover from ransomware attacks in five key categories: backup process, backup infrastructure, security and networking, restore processes, and disaster recovery.R-Score generated from 0 to 1,000Once the questions are answered, an R-Score is generated within a range of 0 to 1,000. In addition to the score, users will be given steps to take to improve their overall score. No user data or information related to generating the initial R-Score is stored or captured in any user identifiable form, Taylor said. A free consultation is available to better understand what measures and steps could be taken to improve an organization’s overall R-Score, Taylor said.”There has always been more of a focus around backup in the industry versus what companies really care about, which is recovery,” Enrique Salem, Partner at Bain Capital Ventures, which led HYCU’s $87.5 million Series A funding round earlier this year, said in a media advisory. “Industry-wide initiatives like R-Score that allow organizations to better prepare themselves in the inevitable event of a recovery in light of ransomware need to be more widely adopted and applauded.”Earlier this year, HYCU announced support for Kubernetes environments and launched its first SaaS-based application on Office 365, Taylor said. More

  • in

    Trucking automation is here (but not as sexy as you think)

    Unfurl the banner, sound the bugle, pop the cork: Automation has arrived in commercial trucking! (Although like many hyped technologies, the reality is more nuanced — and less sexy — than the headlines suggest.) Outrider, which is making a name for itself bringing autonomy to yard operations for logistics hubs, is rolling out automated tractor-trailer hitching capabilities. It’s not a self-driving big rig, but this is actually a big deal, and it’s yet another great case of how automation actually is taking over a sector, albeit in incremental ways. Automation creeps, it doesn’t conquer.Trucking is a really interesting canary in the coal mine for automation. Trucks are the go-to mode of transport for much of the U.S. economy. In fact, over 10 billion tons of freight moves across the US each year. On its way to its destination, just about all of it makes a stop at distribution yards, where trailers are unhitched from trucks. “Nearly all the food we eat, the clothes we wear, and the materials we use are transported by trucks and trailers,” said Andrew Smith, Founder and CEO of Outrider. “Outrider automates yard operations, helping enterprises improve the efficiency and safety of a critical step in their supply chains. Hitching and unhitching is an integral part of yard automation and the global trucking industry, occurring millions of times per day.”While strides are being made toward autonomous trucking, particularly on long haul routes that don’t require in-city maneuvering, a whole bunch of the day to day work of trucking actually takes place in yards, where actions are repetitive, work can be dangerous, and speed is critical. That makes yards a perfect use case for automation, and Outrider is smart to focus on this seam during the industry’s inevitably clunky transition beyond driver-enhancement and toward outright automation, a process that could decades still.The system relies on advanced perception, motion planning, and proprietary control algorithms to enable autonomous yard trucks to optimally align in front of semi-trailers, back under the trailer, and attach the fifth wheel (the connection point of the truck) to the kingpin (the connection point on the trailer) with extreme precision. The system can deliver millimeter level accuracy.”Most autonomous trucking companies are focused on moving trailers down long stretches of public roads. Outrider is focused on moving trailers in distribution yards, where autonomous hitching technology is critical to automating the entire operation,” added Smith. “There is an endless array of slight differences in trailer position and configuration when a truck connects to a trailer. Outrider’s engineers have built groundbreaking technology that adapts in real-time to hitch to trailers of diverse heights, weights, and orientations.”

    To date the company has raised an impressive $118M in funding. More

  • in

    Apple, Microsoft and Amazon chiefs to meet Biden over critical infrastructure cyber attacks

    President Biden will meet Tim Cook, Satya Nadella, Andy Jassy and other tech chiefs at the White House to talk cybersecurity
    GettyImages
    US President Joe Biden has invited Apple CEO Tim Cook, Microsoft CEO Satya Nadella, and Amazon president and CEO Andy Jassy to the White House to discuss how the private sector can help combat ransomware and software supply chain attacks.The forthcoming meeting, reported by Bloomberg, concerns America’s resilience to major cyber attacks on critical infrastructure, which Biden has told Russian president Vladimir Putin should be “off limits”. 

    SolarWinds Updates

    In July, Biden said he believed that if US engaged in a “real shooting war” it would be in response to a major cyber attack. US government agencies and critical infrastructure providers have faced numerous ransomware and espionage attacks during the pandemic, including the SolarWinds software supply chain espionage attack, and ransomware attacks against Colonial Pipeline, Kaseya, and meat packer JBS.Cook, Nadella, and Jassy plan to attend the event on the afternoon of Wednesday, July 24, according to Bloomberg sources. Chiefs of Google, IBM, Southern Co, and JPMorgan Chase have also been invited to the meeting to discuss how critical infrastructure organizations in the banking, energy and water utility sectors can improve cybersecurity and collaboration with the government. Microsoft, AWS, Cisco, FireEye and IBM are currently participating in the government-led effort to shore up US critical infrastructure as part of Biden’s May cybersecurity executive order.      The rise of software supply chain attacks has European cybersecurity teams worried too, because of the difficulties in validating third-party code — be it open-source or proprietary software.

    The SolarWinds attack, which resulted in compromises at Microsoft, multiple top US cybersecurity firms, and several government agencies, highlighted the cybersecurity risks to US critical infrastructure.The other threat comes from commonly-used enterprise software, such as Microsoft Exchange Server, which alleged Beijing-backed hackers were exploiting before Microsoft’s patches were available. More