More stories

  • in

    Hard to see how paying ransoms ever ends well: Telstra CEO

    Image: Telstra
    Telstra and its CEO Andy Penn have a policy to never pay ransom, with the chief saying at the National Press Club (NPC) on Thursday that it never ends well. “I can certainly see in situations where businesses are tempted to do so. Their whole business livelihood could be at threat from a ransomware attack. But candidly, it’s hard to see how that is ever going to end well,” he told ZDNet. “If you pay a ransom, obviously you’re sending a signal to criminals that that’s something that you’d be willing to do.” Apart from inviting further attacks, Penn said there was no guarantee the other party was trustworthy and the best defence was having recent offline backups, good password management, and proper patching. “Prevention, frankly, is much better than trying to solve it after the event, but certainly our policy position would be not to pay ransoms.” Penn said during his speech that Telstra has helped 17 of its enterprise customers over the past year recover from ransomware attacks, and that a number of “very senior individuals who are customers of Telstra” were targeted by business email compromise (BEC) scams. “Once the attack starts, it is very persistent,” Penn said on the BEC attacks.

    On whether companies should be disclosing attacks, the CEO said a disinclination still existed not to disclose attacks, but he noted that some businesses have seen benefits from being transparent. “Companies that are transparent in dealing with it, recognising it, and communicating with their customers are actually building more trust with their customers,” he said. “Because one thing that I think we have to take into account is often what will happen is if an organisation is hacked, and data is stolen, the issue with that data, is that data is usually data that belongs to that company’s customers as opposed to necessarily itself — and it is those customers who are best able to understand the risks associated with that data being disclosed on the dark web, and so you need to communicate with those customers as quickly as possible.” Although currently preferring a carrot to a stick on the issue of whether company directors should be held legally responsible for cyber breaches, Penn said a line did exist. “Ultimately, in egregious situations, where the exposure to cyber risk is seriously potentially a threat to national security or it’s a threat to health or safety, or otherwise, and there has been complete sort of negligence towards ensuring that there are some basic cyber defences in place, then I think directors obviously have to be responsible,” he said. “As they are in other situations, whether it’s in health and safety, or in doing business responsibly and acting in a fair and non-misleading way.” Liberal MPs misunderstand how the free market operates for political gain Penn saved some of his most stinging criticism on Thursday for calls that the company should boost its spending in regional Australia following the sale of 49% of its tower business. At the time of the announcement in June, Telstra said it would be using AU$75 million from the sale to increase coverage in regional Australia and handing 50% of the net proceeds back to shareholders. Speaking to the NPC, Penn said the deal was a way of raising capital, and generating returns for its shareholders, the majority of which are the nation’s superannuation funds. He then pointed to the company’s mobile coverage to rebut claims the company was not spending money in regional areas. “Telstra invests more than anybody in regional and rural Australia — we’ve spent about AU$5 billion, literally, over the last three or four years. In fact, I announced a further AU$500 million in recent weeks investing in regional and rural Australia,” he said. “Those members of Parliament, I think, are confusing their own government policy and their own obligations — which tells you we’re a private enterprise, we’re there to work with and to help and support investment, and we are investing very significantly. We invested overwhelmingly in the mobile blackspots program, more than the rest of the industry put together. We were the only major operator to support the Regional Connectivity Program. “It is, unfortunately a fact that not every part of Australia will receive mobile coverage.” Penn said while the landmass of Australia is around 7.8 million square kilometres, and the company’s network reaches 2.5 million square kilometres, it was a million square kilometres more than second-placed Optus. “The bottom line is, we’re not going to be able to cover every square inch of Australia. That is a reality, and unfortunately those members of Parliament need to come to terms with that reality,” Penn said. “The other point I should say as well, is that in certain electorates, we actually have plans in place to put towers in, but unfortunately those members have not been able to actually get their own local councils to approve the planning permits to get the job done. “I have said this previously with a couple of these individuals, that they need to go and have a walk down the corridor of Parliament house and talk to their colleagues, not to Telstra. In response, Penn was asked whether some Liberal members of Parliament did not understand how the free market worked.”Either that or they choose not to, because it’s politically helpful for them to say the comments that they say,” Penn replied. Related Coverage More

  • in

    KT becomes first South Korean telco to launch 5G standalone service

    South Korean telco KT on Thursday launched its 5G standalone (SA) service, becoming the first carrier in the country to offer mobile services wholly on 5G networks.Local carriers, which commercialised 5G back in 2019, had previously only offered 5G non-standalone (NSA) services so far, where 4G LTE and 5G networks are used together.KT claimed the use of 5G SA over 5G NSA would reduce latency and power consumption for smartphone users.The telco will offer a software update for its subscribers that will allow them to switch network settings from NSA to SA. KT’s 5G SA service will first be available on the Galaxy S20 series of smartphones, before it expands to the Galaxy S21 series later this year. The telco added it will continue to widen device support going forward.According to KT, the launch of 5G SA will also help with the development of multi-access edge computing, which will allow enterprises to offer more autonomous driving and smart factory services for other businesses.Compatriot telcos SK Telecom and LG Uplus, meanwhile, have said they are in no rush to roll out 5G SA services. They said it was still early days and more infrastructure around the service would need to be built for a clear advantage over 5G NSA.

    SK Telecom said it trialled 5G SA at a factory run by chip-making affiliate SK Hynix in January, but it concluded the advantage provided over 5G NSA was minimal for the time being.South Korea is also yet to commercialise mmWave 5G services. Local telcos had previously said they planned to roll out mmWave in 2020, but that was before the pandemic. The South Korean government announced last month that it would allocate 28GHz and sub-6GHz spectrum in November to promote 5G-related services.  As KT prepares to roll out a 5G SA service, local telcos are currently in the midst of various class action lawsuits from consumers who have claimed they exaggerated the performances of their 5G services. A trial from one of these lawsuits against SK Telecom, lodged by 237 consumers, started earlier this month. The other lawsuit filed against all three carriers by over 500 consumers was filed last month.According to the Ministry of Science and ICT, as of April this year, there were 15.14 million 5G subscribers in South Korea.    Related coverage More

  • in

    Fleets existence on Twitter was indeed fleeting

    After introducing Fleets in November, Twitter is set to bin the disappearing content idea on August 3. Reasoning provided by the company in a blog post explained Fleets was intended to promote new people to contribute, but that did not happen. “Although we built Fleets to address some of the anxieties that hold people back from tweeting, Fleets are mostly used by people who are already Tweeting to amplify their own Tweets and talk directly with others.” the company said. “We’ll explore more ways to address what holds people back from participating on Twitter. And for the people who already are tweeting, we’re focused on making this better for you.” Responding to a Fleet was only possible via direct message. Twitter said it would test bringing elements from the Fleet composer into its standard tweet composer, such as full-screen camera, text formatting options, and GIF stickers. Instead of seeing Fleets at the top of user timelines, Twitter said the space would be occupied by Spaces.

    “If we’re not evolving our approach and winding down features every once in a while — we’re not taking big enough chances,” the blog post said. “We’ll continue to build new ways to participate in conversations, listening to feedback and changing direction when there may be a better way to serve people using Twitter.” Earlier this week, the company said it had enabled users to change who could reply to a tweet after it was posted, users previously had to select who could reply before posting. Japan and India lead world in throwing legal requests at Twitter Twitter on Wednesday released its latest transparency report for the half year to December 31, highlighting it received over 38,500 legal demands to remove content from almost 132,000 accounts. Those demands has a 30% success rate. “Although there was a 9% decrease in the number of legal demands Twitter received, compared to the previous reporting period, these requests sought removal of content from the largest number of accounts ever in a single reporting period,” the company said. “Accounts of 199 verified journalists and news outlets from around the world were subject to 361 legal demands, a 26% increase in these requests since the previous reporting period.” Twitter said 94% of legal requests were from five countries: Japan, India, Russia, Turkey, and South Korea. Japan accounted for 30% of legal requests, almost 55,600, with India making over 12,400 demands. Japan’s strike rate against the 67,400 accounts it targeted was 31.6%, while India specified 48,300 accounts but was only sucessful 12.4% of the time. See also: With Modi squeezing Twitter, India’s love for big tech may be ending The number of legal requests from Japan was down 10% from its previous high for the first half of the 2020 calendar year. “The 16,649 requests from Japan were primarily related to laws regarding narcotics and psychotropics, obscenity, or money lending,” Twitter said. “The next highest volume of legal demands came from India, comprising 18% of global legal demands and representing a 152% increase from the previous reporting period. Notably, the number of accounts specified in requests from India also increased by 45% this reporting period.” India was the country with the highest number of legal demands against journalists and news outlets, while South Korea issued four legal demands over content on Vine alleging breaches of privacy and sexual misconduct. Twitter said it removed that content. The company listed multiple examples where it did not take action. “Twitter received multiple legal demands from Hong Kong police in relation to allegations of unlawful and obscene activities against members of law enforcement. No actions were taken as the content did not violate Twitter’s [terms of service],” it said. “Twitter received a legal demand from the Malaysian Communications and Multimedia Commission for alleged hate speech violations under Malaysia’s Penal Code. No action was taken as the account shared newsworthy content and remained compliant with Twitter’s parody, Newsfeed, commentary, and fan account policy.” The company added it received legal demands from Sri Lanka and Saudi Arabia that it did not act on, as well as not acting to two Thai court orders. Indonesia did slightly better on a wide-ranging demand. “Twitter received a legal demand for 60,472 accounts from Indonesia’s Ministry of Communication and Information Technology for violating their Electronic Information and Transaction Law, Number 11 Year 2008. More than 90% of the reported content was determined not to violate Twitter’s [terms of service].” Related Coverage More

  • in

    Google details recent malware campaigns amid uptick in zero-day attacks

    Google has released new details about four zero-day security vulnerabilities that were exploited in the wild earlier this year. Discovered by Google’s Threat Analysis Group (TAG) and Project Zero researchers, the four zero-days were used as part of three targeted malware campaigns that exploited previously unknown flaws in Google Chrome, Internet Explorer, and WebKit, the browser engine used by Apple’s Safari.

    Google’s researchers also noted that 2021 has been a particularly active year for in-the-wild zero-day attacks. So far this year, 33 zero-day exploits used in attacks have been publicly disclosed — 11 more than the total number from 2020. Google attributes some of the uptick in zero-days to greater detection and disclosure efforts, but said the rise is also due to the proliferation of commercial vendors selling access to zero-day vulnerabilities as compared to the early 2010s.”0-day capabilities used to be only the tools of select nation states who had the technical expertise to find 0-day vulnerabilities, develop them into exploits, and then strategically operationalize their use,” Google said in a blog post. “In the mid-to-late 2010s, more private companies have joined the marketplace selling these 0-day capabilities. No longer do groups need to have the technical expertise, now they just need resources. Three of the four 0-days that TAG has discovered in 2021 fall into this category: developed by commercial providers and sold to and used by government-backed actors.”As for the zero-days discovered by Google, the exploits include CVE-2021-1879 in Safari, CVE-2021-21166 and CVE-2021-30551 in Chrome, and CVE-2021-33742 in Internet Explorer.With the Safari zero-day campaign, hackers used LinkedIn Messaging to target government officials from western European countries, sending malicious links that directed targets to attacker controlled domains. If the target clicked on the link from an iOS device, the infected website would initiate the attack via the zero-day.”This exploit would turn off Same-Origin-Policy protections in order to collect authentication cookies from several popular websites, including Google, Microsoft, LinkedIn, Facebook and Yahoo and send them via WebSocket to an attacker-controlled IP,” Google TAG researchers said. “The victim would need to have a session open on these websites from Safari for cookies to be successfully exfiltrated.”

    Google researchers said the attackers were likely part of a Russian government-backed actor abusing this zero-day to target iOS devices running older versions of iOS (12.4 through 13.7). Google’s security team reported the zero-day to Apple, which issued a patch on March 26 through an iOS update. The two Chrome vulnerabilities were renderer remote code execution zero-days and are believed to have been used by the same actor. Both of the zero-days were targeting the latest versions of Chrome on Windows and were delivered as one-time links sent via email to the targets. When a target clicked the link, they were sent to attacker-controlled domains and their device was fingerprinted for information that the attackers used to determine whether or not to deliver the exploit. Google said all of targets were in Armenia. With the Internet Explorer vulnerability, Google said its researchers discovered a campaign targeting Armenian users with malicious Office documents that loaded web content within the browser.”Based on our analysis, we assess that the Chrome and Internet Explorer exploits described here were developed and sold by the same vendor providing surveillance capabilities to customers around the world,” Google said.Google also published root cause analysis for all four zero-days: More

  • in

    SonicWall releases urgent notice about 'imminent' ransomware targeting firmware

    Networking device maker SonicWall sent out an urgent notice to its customers about “an imminent ransomware campaign using stolen credentials” that is targeting Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products running unpatched and end-of-life 8.x firmware. In addition to the notice posted to its website, SonicWall sent an email to anyone using SMA and SRA devices, urging some to disconnect their devices immediately. They worked with Mandiant and other security companies on the issue, according to the release. “The exploitation targets a known vulnerability that has been patched in newer versions of firmware. SonicWall PSIRT strongly suggests that organizations still using 8.x firmware review the information below and take immediate action,” the company said, noting that this was for those with the SMA 100 and the older SRA series.SonicWall urged their users to update to the latest available SRA and SMA firmware, explaining that those who don’t deal with the vulnerabilities are “at imminent risk of a targeted ransomware attack.”Anyone using SRA 4600/1600 (EOL 2019), SRA 4200/1200 (EOL 2016) or SSL-VPN 200/2000/400 (EOL 2013/2014) should disconnect their appliances immediately and change all associated passwords. “Organizations using the following end-of-life SMA and/or SRA devices running firmware 8.x should either update their firmware or disconnect their appliances per guidance below. If your organization is using a legacy SRA appliance that is past end-of life status and cannot update to 9.x firmware, continued use may result in ransomware exploitation,” SonicWall said.  “The affected end-of-life devices with 8.x firmware are past temporary mitigations. Continued use of this firmware or end-of-life devices is an active security risk. To provide a transition path for customers with end-of-life devices that cannot upgrade to 9.x or 10.x firmware, we’re providing a complimentary virtual SMA 500v until October 31, 2021.”

    SonicWall added that customers “should also immediately reset all credentials associated with your SMA or SRA device, as well as any other devices or systems using the same credentials.”Two weeks ago, SonicWall announced a vulnerability in their Network Security Manager that was discovered by Positive Technologies and another with its VPN Portal in June. SonicWall did not respond to questions about which ransomware groups were targeting the vulnerability, but earlier this year, researchers with NCC Group’s Incident Response team discovered a new variant of the FiveHands ransomware targeting SonicWall. Cybersecurity firm FireEye said more than 100 organizations were targeted and some may have been infected even though SonicWall patched the SMA 100 series remote access product vulnerability in February 2021. In a statement to ZDNet, SonicWall said, “Threat actors will take any opportunity to victimize organizations for malicious gain. This exploitation targets a long-known vulnerability that was patched in newer versions of firmware released in early 2021.” “SonicWall immediately and repeatedly contacted impacted organizations of mitigation steps and update guidance. Even though the footprint of impacted or unpatched devices is relatively small, SonicWall continues to strongly advise organizations to patch supported devices or decommission security appliances that are no longer supported, especially as it receives updated intelligence about emerging threats,” the statement said. “The continued use of unpatched firmware or end-of-life devices, regardless of vendor, is an active security risk.” More

  • in

    Getting dressed with help from robots

    Basic safety needs in the paleolithic era have largely evolved with the onset of the industrial and cognitive revolutions. We interact a little less with raw materials, and interface a little more with machines. 

    Robots don’t have the same hardwired behavioral awareness and control, so secure collaboration with humans requires methodical planning and coordination. You can likely assume your friend can fill up your morning coffee cup without spilling on you, but for a robot, this seemingly simple task requires careful observation and comprehension of human behavior. 

    Scientists from MIT’s Computer Science and Artificial Intelligence Laboratory (CSAIL) have recently created a new algorithm to help a robot find efficient motion plans to ensure physical safety of its human counterpart. In this case, the bot helped put a jacket on a human, which could potentially prove to be a powerful tool in expanding assistance for those with disabilities or limited mobility. 

    “Developing algorithms to prevent physical harm without unnecessarily impacting the task efficiency is a critical challenge,” says MIT PhD student Shen Li, a lead author on a new paper about the research. “By allowing robots to make non-harmful impact with humans, our method can find efficient robot trajectories to dress the human with a safety guarantee.”

    Play video

    Robot-assisted dressing could aid those with limited mobility or disabilities.

    Human modeling, safety, and efficiency 

    Proper human modeling — how the human moves, reacts, and responds — is necessary to enable successful robot motion planning in human-robot interactive tasks. A robot can achieve fluent interaction if the human model is perfect, but in many cases, there’s no flawless blueprint. 

    A robot shipped to a person at home, for example, would have a very narrow, “default” model of how a human could interact with it during an assisted dressing task. It wouldn’t account for the vast variability in human reactions, dependent on myriad variables such as personality and habits. A screaming toddler would react differently to putting on a coat or shirt than a frail elderly person, or those with disabilities who might have rapid fatigue or decreased dexterity. 

    If that robot is tasked with dressing, and plans a trajectory solely based on that default model, the robot could clumsily bump into the human, resulting in an uncomfortable experience or even possible injury. However, if it’s too conservative in ensuring safety, it might pessimistically assume that all space nearby is unsafe, and then fail to move, something known as the “freezing robot” problem. 

    To provide a theoretical guarantee of human safety, the team’s algorithm reasons about the uncertainty in the human model. Instead of having a single, default model where the robot only understands one potential reaction, the team gave the machine an understanding of many possible models, to more closely mimic how a human can understand other humans. As the robot gathers more data, it will reduce uncertainty and refine those models.

    To resolve the freezing robot problem, the team redefined safety for human-aware motion planners as either collision avoidance or safe impact in the event of a collision. Often, especially in robot-assisted tasks of activities of daily living, collisions cannot be fully avoided. This allowed the robot to make non-harmful contact with the human to make progress, so long as the robot’s impact on the human is low. With this two-pronged definition of safety, the robot could safely complete the dressing task in a shorter period of time.

    For example, let’s say there are two possible models of how a human could react to dressing. “Model One” is that the human will move up during dressing, and “Model Two” is that the human will move down during dressing. With the team’s algorithm, when the robot is planning its motion, instead of selecting one model, it will try to ensure safety for both models. No matter if the person is moving up or down, the trajectory found by the robot will be safe. 

    To paint a more holistic picture of these interactions, future efforts will focus on investigating the subjective feelings of safety in addition to the physical during the robot-assisted dressing task. 

    “This multifaceted approach combines set theory, human-aware safety constraints, human motion prediction, and feedback control for safe human-robot interaction,” says assistant professor in The Robotics Institute at Carnegie Mellon University Zackory Erickson. “This research could potentially be applied to a wide variety of assistive robotics scenarios, towards the ultimate goal of enabling robots to provide safer physical assistance to people with disabilities.” 

    Li wrote the paper alongside CSAIL postdoc Nadia Figueroa, MIT PhD student Ankit Shah, and MIT Professor Julie A. Shah. They will present the paper virtually at the 2021 Robotics: Science and Systems conference. The work was supported by the Office of Naval Research. More

  • in

    Does cybercrime impact cryptocurrency prices? Researchers find out

    As the price of cryptocurrency increases so does the volume of illicit mining detected in the wild, researchers say. 

    Cryptocurrency has become a favored means for many threat actors to monetize cyberattacks. While, perhaps, the most well-known application of crypto including Bitcoin (BTC), Ethereum (ETH), and Monero (XMR) in the criminal realm is when ransomware payments are made, more covertly, cryptocurrency mining is also a problem.  Cryptocurrency mining malware, when deployed on PCs or unsecured servers, quietly siphons away computing resources to generate virtual currency which is then sent to wallets controlled by its operators.  Also known as cryptojacking, the most common forms of this malware — which may start out as legitimate programs before being twisted for criminal purposes — in the wild include Coinhive, Jsecoin, XMRig, and Cryptoloot.  Cyberattackers will look for the best returns for their time, and in an examination of the topic published on Wednesday, researchers from Cisco Talos attempted to define the links between cryptojacking rates and cryptocurrency prices.  Monero was chosen as the cryptocurrency of interest and cryptomining activity for this coin, against its value, between November 2018 and June 2021, was analyzed. “Monero is a favorite for illicit mining for a variety of reasons, but two key points are: It’s designed to run on standard, non-specialized, hardware, making it a prime candidate for installation on unsuspecting systems of users around the world, and it’s privacy-focused,” the researchers say.

    Talos notes that while the value of this cryptocurrency has fluctuated over the years — indeed, like many others — its price increased from late 2020 to now, when it has experienced a pullback.  The researchers then applied network-based cryptojacking detection tools which monitored Monero in millions of events associated with cryptocurrency mining.  According to the team, not only were they “floored” to see how much more common cryptojacking is since 2018, but also, outside of the price drop in early 2021, “the graph tracks almost identically to the value of the currency.”
    Cisco Talos
    “This was honestly a pretty surprising correlation since it’s believed that malicious actors need a significant amount of time to set up their mining operations, so it’s unlikely they could flip a switch overnight and start mining as soon as values rise,” Talos says. “This may still be true for some portion of the threat actors deploying miners, but based on the actual data, there are many others chasing the money.”However, considering crackdowns on cryptocurrency mining and trading around the world, if the cryptojacking environment becomes more difficult or less lucrative, it is entirely possible that threat actors will turn their attention to the next big thing.  “Detection for cryptomining can be spread into a variety of different places including blocking mining-related domains, to enforcing limitations on the end system preventing the mining from starting and lots of network-based detection, which this research is based on,” Talos says. “Regardless of the detection point, organizations should be working to prevent it.” Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    The rise of the robot expert

    There’s a new role that is becoming an integral part of many warehouses, distribution centers and factories globally: the robot expert. As labor shortages strain the manufacturing and supply chain sectors, business leaders need to realize the value of the robot expert and how they can help solve these challenges. By upskilling individuals to manage a team of robots, mundane tasks can be left to the machines while experts handle big picture thinking and overall management of the warehouse. But where do decision makers, who often see a need but don’t have technical expertise in automation, start looking? Where are the opportunities and what’s at stake for companies that don’t adapt?To gain insights into these and other questions about this new role and growing opportunity, I reached out to Bryan Siegal, VP, Customer Success, Vecna Robotics, as well as Mahesh Nikam, Shape Excellence System Manager, Shape Corp.GN: How is the rise of automation catching some companies off guard or flat footed and what are some ways that you’ve seen companies arrive at the moment of adoption unprepared for the challenges ahead?Bryan Siegal: We are hearing from most of our customers that business has now boomed to levels they have never seen before and it has pushed demands beyond the capacity of their sites. Many have gone to extended days and shifts. Finding associates to work the added shifts is a major problem to meet all their demand. These companies are caught flat footed by not having the extra capacity needed where they could otherwise have literally turned the switch and let the robots run longer. Instead, they are having to turn away revenue because they simply can’t find the resources to get it done.The other big factor is that adopting robots takes time. Change management must be considered, including updating processes, training staff, effective reporting and management, etc. So, organizations that invest early and learn how to effectively use robots in their operations have a massive advantage over those that don’t. GN: Can you describe what an internal Robot Expert is and various ways the role can help a company?

    Bryan Siegal: The internal robot experts are associates who have been trained to interact with and operate the robot fleet at an advanced level. In this capacity, the robot expert is the on-shift expert ensuring the fleet is on mission as well as answering questions from other associates as needed and dealing with any “exceptions” as they arise. Beyond local fleet oversight, the robot expert is the prime point of contact for our Network Operations Center (NOC) team who provide 24×7 proactive remote monitoring to ensure the fleet is running optimally. Consequently, the robot expert is key to ensure the productivity gains enabled by a fleet of robots is returned to the company.GN: When is the right time in a company’s trajectory or growth to create a role like this?Bryan Siegal: When a company’s growth rate, ability to find labor, or cost structure, forces them to realize they cannot keep up with competition, they often decide that autonomous equipment like our self-driving forklifts and tuggers are the solution. The team then creates a project plan for roll-out and continued operations. During that process, they appoint a team of robot experts  for all shifts the fleet will be operating. The Robot Expert plays a key role in assisting with the deployment of the fleet as well as operating the fleet once fully deployed.GN: Mahesh, I’d like to bring your experience at Shape to bear here as well. What sort of existing employees tend to make great Robot Experts and how does SHAPE CORP. support their transition to that very new role? Mahesh Nikam: Currently, Shape is transitioning to automated material handling by developing our current team members specializing in forklift operation and utilizing their proficiency in this area to mold them into Autonomous Mobile Robot experts. We provide team members with an in-depth training on AMR safety and functionality along with hands-on training to help further develop their skill-set in this area. After team members complete their training they then receive an update on their Industrial Vehicle license for AMR. We want to ensure our team is set up for success for all development opportunities we provide at Shape.GN: Bryan, how about from your perspective? What do the best candidates for the role have in common?Bryan Siegal: The best candidates for the Robot Expert role exhibit several things: comfort working with industrial equipment, demonstrated skills working with software, excitement about working with cutting edge technology, and a deep understanding of the day-to-day flow in their working environments. Above all, these are folks who want to see the company grow and succeed. These qualifications are often learned on the job, and candidates are often associates with several years of operational experience. They may also be supervisory level individuals, but all have an open mind and willingness to see new technology help transform their operations. By contrast, they do not have to be degreed engineers as we are not asking the Robot Expert to diagnose and repair robot problems. We  work virtually alongside the expert and through this partnership to diagnose and resolve issues via our 24×7 NOC center. This collaboration is essentially an “on the job training” that propels their career forward as they grow and learn how to manage these types of systems. As this role becomes a mainstay, companies and industries should establish the role as a formal role and  a career choice.GN: What resources, education or professional development-focused, are available for would-be Robot Experts? Bryan Siegal: This is an emerging role tied to the deployment of AMRs. At this early life-cycle stage across the AMR industry, training is limited to one-on-one highly personalized training with customized collateral.That being said, there are a few specialized areas where training would be beneficial. Robots use sensors to see the world. This includes cameras, Lidars (generally a rotating laser range finder), Ultra-sonic range finders, time of flight cameras and others. Understanding how those sensors work, and common failure modes can be extremely helpful in ensuring top performance of the robots. Another area of training is wireless networking since almost all robots depend on the wireless network for operation. Vecna Robotics’ AMRs are connected to the customer’s WiFi or cellular network. This  is how we maintain communication with the AMR. Improving the robot experts’ understanding of the network needs and operational environment will make that person a valuable asset not only to us, but to the operation overall.  The third area of specialized training that can be helpful is around robot safety.  Safety requirements for these systems are stringent, and if the staff doesn’t understand how the safety systems work, it can be frustrating as they ask, “why isn’t the robot moving?” Unlike manually-operated equipment, robots are mandated to have certain stand-off distances from other objects. Information on all of these key areas can be found on Vecna Robotics’ and MassRobotics’ websites. GN: Mahesh, as SHAPE CORP. grows and the company’s automation needs mature, and Bryan, as the same happens to Vecna and the companies it supports, how do you both expect the role of Robot Expert to change and evolve? Mahesh Nikam: Our vision at Shape is to have our AMR Fleet servicing all production lines and keep manually operated forklifts only in areas we specify. With an expansion of AMRs we are envisioning to have a central area where AMR Experts manage the fleet with an automated order system. As we grow, this role will evolve even more by optimizing AMR routes, co-coordinating and supporting the implementation of new AMRs as well as training and onboarding new teams to assist with the management of this pivotal asset to Shape’s growth.Bryan Siegal: Much like the training and expertise of a car mechanic has evolved along with the evolution of automobile technology, I expect the role of the Robot Expert will change as AMRs become smarter through newer sensors, faster computer processing power and more sophisticated AI algorithms. The combination of these improvements will result in AMRs being capable of performing more sophisticated jobs, working faster in teams (both human and robot teams) and allowing for greater operational throughput. Part of the career path here will be growing from operating the robots, to learning how to effectively deploy new robots as the tools to do that become more mature and accessible to workers without advanced engineering degrees. The Robot Expert will also become part of the operational decision-making level across a site, because their knowledge of how to achieve the best outcomes using the robots will be valuable as site changes and updates are considered. More