More stories

  • in

    Ransomware is the top cybersecurity threat we face, warns cyber chief

    Ransomware is one of the key cybersecurity threats facing the UK and the cyber criminal groups behind them are becoming more dangerous, the UK’s cyber chief is to warn.Lindy Cameron, the head of the National Cyber Security Centre (NCSC) will say that the organisation – the cyber security arm of spy agency GCHQ – is committed to tackling the threat of ransomware and “supports victims of ransomware every day” but that a coordinated response is required to combat the growing threat.While state-sponsored hacking campaigns pose a “malicious strategic threat to the UK’s national interests”, it’s cyber crime – and in particular ransomware – which has become the biggest threat.”For the vast majority of UK citizens and businesses, and indeed for the vast majority of critical national infrastructure providers and government service providers, the primary key threat is not state actors but cyber criminals,” Cameron is due to say in a speech to the Royal United Services Institute (RUSI) defence and security think tank.SEE: Network security policy (TechRepublic Premium)Recent incidents like ransomware attacks against like Colonial Pipeline and meat processor JBS, as well as the ransomware attack against the Irish healthcare service, have demonstrated how disruptive these cyber criminal campaigns can be to critical services.Meanwhile, UK organisations including businesses, government agencies, schools and universities have all fallen victim to ransomware attacks this year.

    Not only are cyber criminal ransomware groups encrypting networks and demanding a significant payment in exchange of the decryption key, now it’s common for them to also steal sensitive information and threaten to release it unless a ransom is paid – often leading victims to feel as if they have no choice but to give in to the extortion demands.”As the business model has become more and more successful, with these groups securing significant ransom payments from large profitable businesses who cannot afford to lose their data to encryption or to suffer the down time while their services are offline, the market for ransomware has become increasingly professional,” Cameron will say.Ransomware is successful because it works; in many cases because organisations still don’t have the appropriate cyber defences in place to prevent cyber criminals infiltrating their network in the first place in what the NCSC CEO described as “the cumulative effect of a failure to manage cyber risk and the failure to take the threat of cyber criminality seriously”.But another reason it has become such a problem, particularly for the West, is because many of the most successful ransomware groups are working out of what Cameron described as “overseas jurisdictions who turn a blind eye or otherwise fail to act to pursue these groups”.Russia in particular is thought to be home to a number of cyber criminal ransomware groups, but the government doesn’t act on their activity because they’re not harming Russian businesses or citizens.”These criminals don’t exist in a vacuum. They are often enabled and facilitated by states acting with impunity,” she said. SEE: This company was hit by ransomware. Here’s what they did next, and why they didn’t pay upHowever, Cameron will say it’s possible to fight against the blight of ransomware by combining the efforts of cybersecurity experts, the government and with wider international cooperation.”In some respects, our response to ransomware is straightforward: we need to continue to build the UK’s cyber resilience so that attacks cannot reach their targets in the first place,” she said.”But in many other respects it requires a whole of government response. This starts with the efforts to prevent the activities of the groups behind these damaging attacks”.However, ransomware isn’t just a problem for the UK alone and Cameron urged the importance of working with other countries to tackle what’s truly an international problem.MORE ON CYBERSECURITY More

  • in

    Massive data centre demands could lead to power blackouts, warns Ireland's utilities regulator

    Data centres are putting a potentially unsustainable strain on the nation’s electricity grid, Ireland’s utilities watchdog has warned.The situation has become so bad that Ireland’s Commission for Regulation of Utilities (CRU) has warned in a consultation paper that the nation could face rolling blackouts if the situation isn’t rectified. The prospect of extended blackouts from data centre energy demand has prompted EirGrid to raise an alarm. 

    “EirGrid have highlighted the considerable challenge the electricity consumer faces over the coming years. The worst outcome of which could result in load shedding and ultimately rolling blackouts. This is not acceptable to the CRU and measures need to be introduced to manage the supply demand balance,” CRU said in its report.   SEE: IT Data Centr Green Energy Policy (TechRepublic Premium)The CRU considers that data centres are “the single largest homogenous demand driver” on the grid and wants data centre operators to provide answers to enable further grid integration in order to maintain the security of electricity supply.EirGrid has told the CRU that data centres and the demand load they require are “having a major impact on the Irish electricity system currently and into the foreseeable future.” Ireland’s energy supply problems are not new. In 2017, EirGrid warned that growing energy demand in Ireland was mainly from new data centres, which are already putting a strain on Dublin’s infrastructure.

    Until it upgrades transmission equipment in Dublin, it said it may need generators to cope with demand in the short term. EirGrid said it expects data centres to account for 15% of total energy demand by 2026 – up from less than 2% in 2015.The CRU has considered three scenarios: do nothing and wait for blackouts, impose a moratorium on data centre connections, or let EirGrid request data centres to throttle consumption. “In this [second] scenario CRU could issue a Direction to the system operators to cease processing all data centre connection applications (including modifications) and new connection applications for a number of years,” the CRU wrote of its moratorium option. “The CRU does not consider this appropriate at this time as there are mechanisms that data centres can employ which in the CRUs view can contribute to their overall flexibility.”SEE: Cloud computing: Microsoft sets out new data storage options for European customersA third option is imposing “connection measures” that would let EirGrid and fellow system operator ESBN prioritize data centre connection applications based on several categories that would protect the supply of energy. This includes data centre operators reducing energy consumption when requested by EirGrid.  CRU considers the third option the most balanced and preferred option. “This option should allow the data centre industry to continue to connect in a manner which respects the overall system integrity while balancing the needs of the consumer to have a secure and stable supply of electricity,” the CRU said. According to the Irish Times, a data centre with a load of 60 MW would be comparable to the load usage of a large town/small city such as Kilkenny. More

  • in

    What is 6G, if anything? A guide to what to expect, from whom, and when

    Frame from LeoTrack, a commercial low-earth orbit (LEO) satellite tracking service operated by Menlo Park, California-based LeoLabsIf there is to be a “6G Wireless,” its proponents will need to learn some significant lessons from the era of 5G. Already, 5G Wireless as a market strategy is four years old. The R&D divisions of telecommunications firms whose 5G rollouts are well under way, are now looking ahead to whatever the next version of wireless may be. . . or, at least, they’re trying to. So far, what they’re seeing may be a bit far out.

    “6G must deliver an outcome that is aligned with real needs,” remarked David Lister, Head of 6G Research and Development Technology at Europe’s Vodafone Group, “and deliver outcomes that are sustainable and commercially driven.” Lister was speaking at an annual conference called the 6G Symposium.  Yes, there is already an annual 6G Symposium.Why 6G is not a standard yetAnd yet there isn’t quite a 6G. Back in 1998, the leading stakeholders in global telecommunications formed the 3GPP consortium, to officially designate which technologies belong to a “G” and which don’t.  3GPP has yet to formally adopt any timeline for the development of anything called “6G Wireless.” Neither 3GPP nor any other industry group has endorsed or ratified any standard, set of standards, or placeholder for standards to come, with a “6” in it.  (Officially, 3GPP has scheduled dates for Release 18 of global standards, though the forthcoming Release 19 is presently slated for 5G.)  Theoretically, future releases beyond those the organization has already planned, could be designated “5G.” Possibly, though not as likely, 3GPP could stop designating its releases with any “G” at all — there’s no rule that there must be a “6G” or a “7G.”Nevertheless, major telecommunications equipment and service providers have hired or appointed 6G strategy leads and research chiefs, attaching “6G” to their job titles. Vodafone’s David Lister is just one example.These new 6G department heads may not all share a mutual purpose just yet. Certainly not all are presently 5G stakeholders. However, they do appear to share one common job function: articulating some facsimile of a desirable future — one where 5G may be comfortably discussed in the past tense.Vodafone’s David Lister”The traditional focus in generational networks has always been on the radio and the core,” continued Lister.  “5G broke that history. It started a transition towards more IT architecture, cloud-native, software-based networks. And I think, as we are increasingly in this IT domain going forward, we can expect future technologies to be introduced in an agile way, not necessarily encumbered by ten-years-generational thinking, but more incrementally, with regular feature improvements.”Are we already done with 5G?5G is not yet the success its stakeholders promised. Of all the bountiful transformations to business and culture to be brought forth by 5G, which we’re still being told are forthcoming, connection speed tops that list. And so long as 5G must co-exist with 4G LTE during the transition period, that promised speed just isn’t there today.

    Ranking a close second behind speed on that list of promises is functionality. A May 2021 report from Ericsson Consumer Lab [PDF] surveying more than 30,700 participants revealed that 7 of 10 respondents were dissatisfied with the lack of new and innovative apps and functionality made available by 5G. Among South Korean network users in particular, their general dissatisfaction with the launch of 4G in April 2012 (26 percent satisfaction) remains essentially unchanged following the launch of 5G seven years later (27 percent).A new “G” is supposed to be exciting. We’ve been promised transformational applications whose benefits we can not only immediately see, but feel. That excitement is supposed to directly translate into revenue. The more excited customers are about the network, the greater the revenue stream.But this has not actually happened. As Ericsson’s survey data indicates, not since Apple’s introduction of the iPhone — the culmination of 3G — has such a wellspring of excitement and enthusiasm ever materialized for the network. Should 6G become a thing, telcos cannot afford to simply repeat the 5G experience, and expect a different outcome.What to expect from 6G that would be any different  Stephen Douglas”One thing is clear: 6G is going to be an amalgam of complementary technologies, coming to deliver new sets of use cases and values,” remarked Stephen Douglas, head of 5G/6G strategy for UK-based network engineering firm Spirent Communications. On Douglas’ list: highly directional, “pencil-beam” antennas that receive terahertz-level frequencies for vastly greater data rates; transmitters whose capability of sensing the environments in their respective vicinities could enable sub-centimeter global radar; and wireless sensors implanted on users’ bodies, for what he calls body-area networks (BAN).Assuming any of this is even physically possible, this system — or something resembling it — would need to supplement 5G rather than replace it. For such a vision of 6G to become feasible, 4G will need to have been completely excised from telecom networks. The goals which would lead telcos to begin phasing out 5G, probably sooner than they’d planned, today tend to center around the following themes:Line-of-sight, free-space connections. Connecting every 5G base station to every other one in its vicinity, in a perfect mesh, using terrestrial fiber optic cable, is not possible.  5G has sought to address this obstacle by leveraging millimeter-wave communications (mmWave) to bridge backhaul gaps over difficult terrains. So far, however, successful trials of mmWave have been slow in coming. But a movement is under way to resolve these logistical issues, enabling lasers to beam line-of-sight (LoS) signals across terrestrial hops of just a few miles each, for connections where laying physical cable, and then maintaining it, wouldn’t be practical. And where LoS isn’t practical, engineers are working on synthetic mirrors that may act as passive reflectors, called reconfigurable intelligent surfaces (RIS) — metals that can change their own reflectivity characteristics when the weather changes.A reformed service model. It was 4G that gave rise to the idea that some of the network’s control and management functions could be shifted to a cloud platform — even a public cloud, if the security was there.  5G Multi-access Edge Computing (MEC) has popularized the idea that industry leaders can actually own and operate their own wireless networks, leading many (admittedly, those outside telcos) to speculate as to whether wireless network operation as a service could be a viable product, replacing and superseding Wi-Fi for major industries.Terahertz spectrum. Up until very recently, the popular belief has been that, because terahertz (THz) radio frequencies would be useless for broadcasters, they’d be useless altogether. But in recent years, and even weeks, researchers have discovered that highly directed beams no wider than a pencil can be steered along paths using passive reflectors (RF mirrors), ping-ponging from point to point for at least several hundred yards, and perhaps eventually miles.  6G advocates point to this discovery as a possible catalyst for launching research into “4D-video,” whose projections some say you should be able to smell and touch, as well as see and hear. Applications involving this much data, these advocates claim, would only be feasible through wireless links at frequencies hundreds or thousands of times beyond the gigahertz (GHz) spectrum currently being allocated to 5G.Artificially intelligent network adaptivity. Enterprise IT is already familiar with the concept of software-defined networking (SDN), in which virtual nodes are mapped to physical nodes so that functions and applications perceive only the networks they need to use. Academic researchers suggest that the performance levels required for high-priority applications such as real-time telemedicine, perhaps coupled with haptic communications (enabling, for example, remote surgery), can never be achieved with 5G as its practitioners envision it. A kind of virtual overlay may need to be “imprinted” onto the 5G network by way of SDN, and since we’re talking about the entire global network, the only way to achieve this practically may be through AI-endowed network proxies — a technology that would require 3GPP-directed integration.A redefinition of “communication” itself. In discussions around this objective, the word “teleportation” may actually be heard more frequently than you’d expect. Here, engineers are advocating in favor of communication systems that convey the full illusions of presence, so that people (however aided by electronic devices or headgear) may feel, touch, and even smell the subjects of their conversation. The bandwidths required for this level of “tele-presence,” they say, far exceeds what 5G could possibly provide for.The easiest route to a marketing theme for 6G, you’d think, would be to talk about more speed. That theme might work, if there were some history of speed improvement to back it up. Without an appreciable speed boost for 5G, extending the speed promise to 6G could look too much like kicking the proverbial can down the road, for the next generation to tackle. If there’s anything that stands in the way of truth, there’s its own stubborn veracity.So before they can begin building new technologies in earnest, the first 6G advocates are beta-testing narratives on their prospective customers, if you will, to see what fits and what doesn’t.Theme 1: Castles in the skyIn March 2019, the FCC adopted an order opening up a total of 21.2 GHz of radio spectrum, for unlicensed, experimental use, at frequencies ranging between 95 GHz and 3 THz. Until at least 2029, the Commission ordered, “innovators and entrepreneurs” would be given free and full access to these valuable patches of radio frequency, although famously, wireless and satellite providers disagreed as to whom the Commission was referring.As the world emerges from the pandemic to find its roads and bridges having crumbled some more, its lead water pipes more decayed, the roofs of its schools caving in, and neighborhood foundations resting on sewers whose pipes have already washed away, there’s more than a bit of skepticism over whether a new network of low-Earth-orbit (LEO) satellites should be considered a national infrastructure priority.The counter-argument being posed by the new 6G advocates is this: The wireless infrastructure we have, even with 5G, is woefully inadequate to support the applications we want.  Prof. Rahim Tafazolli”We need to realize the fact that we cannot provide ubiquitous coverage everywhere only by terrestrial means,” remarked Prof. Rahim Tafazolli, who heads the University of Surrey’s Institute for Communication Systems, speaking at 6G Symposium.  “We need to look seriously at low-Earth-orbit in a complementary fashion, not in a competitive fashion. The main challenge here is, can we provide direct access between satellite and user equipment — mobile phones?”Over the past decade, one of the most visible proponents of a global mesh scheme has been Samsung. Last year, Samsung began injecting new life in an otherwise old idea by attaching it to 6G.Way back in 2015, Samsung announced its interest [PDF] in building a constellation of some 4,600 LEO satellites, orbiting low enough to minimize signal latency, though not high enough to achieve geostationary orbit. Knowing full well that 5G was still in the embryonic phase of development, then-head of Samsung Research, Farooq Khan (now CEO of 5G security firm Exium) argued in favor of satellite-oriented mmWave as an alternative to fiber optic cable for high-capacity data backhaul — effectively “grounding” 5G in space. It’s a well-known fact, Khan asserted to folks who never knew this fact, that the propagation of signals in free space is about 1.4 times faster than through fiber cable.
    Samsung
    ×samsung-ntn-coverage-diagram.jpgRecently, Samsung began tying this LEO concept to a 6G-related initiative, calling LEO a “megatrend toward 6G.” In this diagram from its recent white paper, the company foresees high-altitude platform stations (HAPS), like signal-reflecting dirigibles, partnering with LEO to provide signal coverage in areas not supported by terrestrial base stations (BS). It’s a toned-down message from the 2015 edition, perhaps more aware of the fact that base station operators are telcos that are not willing just yet to give up control of their end-to-end coverage. Since LEO satellites move relative to the Earth, any network node that covers users at sea for any given hour, may cover users on land the next hour.If the world had a single 6G vendor — perhaps a state- or multi-nationally sponsored monopoly — this type of global configuration might not be a problem. As things stand, however, LEO satellites are not stationed high enough above the atmosphere to become geostationary. So the only way for an LEO operator (whether or not it’s affiliated with a telco) to operate an LEO network, would be for it to be given the freedom to claim the entire globe as its real estate. The only way to do that safely may be to lay claim to a narrow band of altitude, in a similar way to how a radio operator is granted claim to a frequency. In the absence of a global altitude-regulating agency, and with geodiplomacy between nations in the state it is today, any such claim, regardless of who makes it, won’t be granted much merit.So when would the skies become too cluttered for Samsung’s dream to be viable? An October 2020 NASA letter to the FCC suggests this has already happened. Objecting to the stated plans by a firm called AST & Science to build what it calls “the first and only space-based cellular broadband network to be accessible by standard smartphones,” NASA’s Commercial Space Transportation Interagency Group warned the private group’s satellites would be situated too close to a group of satellite constellations that NASA operates with partners, called the “A-Train.” The letter went on to claim AST’s constellation “contains extremely large satellites in a debris-rich orbital regime and will therefore experience a very large number of satellite conjunctions, certainly with debris objects and potentially with A-Train satellites themselves.”In saying so, NASA inadvertently revealed that space is already too cluttered even for its own operations. Space, in other words — at least, the space we really want for 6G — may be taken.Theme 2: A new business model for service providers”We often talk about going beyond connectivity,” remarked Aaron Boasman-Patel, vice president of AI and customer experience at telco industry consortium TM Forum, during a recent webcast produced by UK-based 6GWorld.  “What 5G and, then towards the end of the decade, 6G will teach us is, how important connectivity is as an underlying technology.”Boasman-Patel perceives 5G as a foundation for the formation of a kind of software and services market, which would itself be 6G. This upper-level market would function more like cloud services and IT, where vendors cohabit a space but tend not to own it end-to-end.”The hardest thing to understand, I say, is not necessarily the technology,” he continued.  “The technology is only one piece of the puzzle. You have to fundamentally change your operating and your business models, and say, how can the technology enable us to do that, as opposed to the other way around?”One configuration being discussed would enable much smaller organizations than telcos to become telco service providers in limited areas, and enterprise customers themselves to own patches of wireless coverage areas. Such a configuration would be an extension of the Multi-Access Edge Computing model currently under way for 5G, where companies with their own corporate campuses operate their own towers — giving them a way to replace limited-range Wi-Fi with longer-range, higher-bandwidth service.But if subdividing the network is the solution to putting high bandwidth in place, what would the incentive be for telcos to permit the wholesale subdivision, and subsequent conquering, of major portions of their own networks, using their own technologies?”I don’t think it’s as simple as it sounds,” remarked TM Forum’s Boasman-Patel, in response to this question from ZDNet. He continues:  Aaron Boasman-PatelFundamentally, what we’re saying is, CSPs [communications service providers] will probably own the connectivity. That is why they’re building out all of those services, and really focusing on having the best connectivity possible. If you speak to Verizon, that’s their number-one mantra; if you speak to Orange, their mantra; speak to Vodafone, that’s what they’re going to do. That is critical, because as I think we’ve seen now with COVID and different stages of people working from home, connectivity is the core of everything else. I think connectivity’s getting exciting, because people need the speeds. They want the guarantee of service.They will always own that connectivity. But where it becomes interesting is the applications that sit on top of it. I don’t believe that CSPs will own the edge in every single location, and be able to offer all those services. But what if we migrate to [an open model] where you can buy and provision a service, and you can share that edge capability? So in some areas where you’ve got stronger infrastructure, you can move those applications. . . between CSPs, to give you better coverage. That way, you’re getting revenue from your application, not having to build out infrastructure where it doesn’t make sense.(Note: We at ZDNet have historically used “CSP” as an abbreviation for “cloud service provider,” but among European telcos, the “C” stands for “communications.”)So in Boasman-Patel’s view, 6G could bring about a new business model where individual telcos drive “end-to-end” communications, as well as continue to maintain single customer accounts. In exchange, they’d need to be content with shortening the distances between one end and the other, and ceding control of the customer edges to a more IT-oriented marketplace, where the “C” stands for “cloud.”Theme 3: Supplementing or replacing microwave frequencies with terahertz”What 6G is not is a new business model,” stated Prof. Tafazolli.  “It is not 5G plus AI, it is not OpenRAN, it is not higher speed, and it is not more secure.  6G should bring new capabilities that 5G cannot deliver, and I believe [one example] is time synchronization.”The technology to which Prof. Tafazolli refers here, means more than just calibrating metronomes. He’s one of a growing group of engineers who foresee the possibility of a future network where radio waves — whose frequencies range between just below 6 GHz (the “sub-6” band) to at or near terahertz level (THz) — can be steered through metropolitan areas, from point to point, like ping-pong balls bouncing off metal pans in an obstacle course. The metal, in this case, would include an as-yet-theoretical concept for adapting the reflectivity of metal sheets in real-time, called reconfigurable intelligent surfaces (RIS). We could be talking about metal plates on the outsides of buildings or, in instances where beams are being steered indoors, literally reflective wallpaper.Imagine if the metal pans in this obstacle course could shift their angles ever-so-slightly to compensate for changing weather. RIS relays would need to do precisely this. But a functional RIS network would require millions upon millions of such surfaces, attached to buildings, windows, and skyscrapers. They could make the world look as though graffiti had been left everywhere by an alien species who communicated in QR codes. The collective movements of surfaces in any such network would require a level of orchestration never achieved before in human history. Thus, time synchronization. Technologies on the subatomic level of quantum processors may be called for here.×ris-surfaces-use-case-diagram.jpgA May 2021 paper [PDF] suggests that a completely passive RIS surface may be more effective (and obviously more energy efficient) at steering signals around physical obstacles, than the multi-antenna MIMO system implemented by 5G. Today’s MIMO can overcome the path loss suffered by 5G mmWave and even sub-6 signals, by packing very large antennas receiving multiple frequencies in very small spaces. But that process consumes tremendous power, which 5G was supposed to be saving. RIS would get around this problem through the use of metamaterials, capable of changing their own reflectivity in response to voltage changes in an underlying diode, triggering phase shifts. Those shifts are literally reflected in any signal that bounces off of them, enabling them to be tuned in real-time, according to changing environmental conditions.The IEEE researchers tout one foreseeable additional benefit to RIS: the ability to make high-frequency signals secure without the aid of digital or quantum cryptography, through the addition of artificial noise and phase transitions that a surreptitious listener, by virtue of being in a different location from the intended receiver (as fantastic as this sounds), would be unable to filter out.Theme 4: Overlaid network intelligenceEnabling this highly sensitive and dynamic system of signal exchange would inevitably require AI functionality beyond anything ever implemented in a communications network.  Researchers with St. Joseph Engineering College in Mangalore, India, are proposing that the required AI for 6G may be so extensive that AI should actually become the foundation of the entire network’s operations. In other words, 6G functions should reside on an AI platform, rather than the other way around.From a 2020 IEEE paper.×6g-ai-foundation-diagram.jpgIn this diagram from an IEEE paper by Profs. Jagadeesha Brat and Salman AlQahtani, 5G on the left is represented by some of the components in 5G New Radio (5G NR): Enhanced Mobile Broadband (eMBB), Massive Machine-Type Communications (mMTC), and Ultra-Reliable Low-Latency Communications (uRLLC). Picking up on 3GPP lower-casing its adjectives, Brat and AlQahtani pile on several new components of a theoretical 6G radio core on the right, adding ideas like “ultra-High Security” (uHS) and “ultra-High Sensing and Localization” (uHSLo), which in this case are suggestions rather than formal projects.The theme they convey may be prescient: Whatever 6G becomes, it’s more likely than not to subdivide into even more technology tracks. When that happens, they’ll all need something to bring them all together, and at least make them seem smart.On top of all this, remarked 6GWorld Managing Editor Alex Lawrence in a note to ZDNet, the intelligence built into any new wireless network will need to extend to all the devices linked into the network. That includes not only wireless phones, but wireless vehicles. Wrote Lawrence:Building security by design into a new network will be a first, and again will demand new approaches and probably business models. And then there are other things to think about as the physical world interacts with the digital one, such as ‘functional safety’ and resilience. That’s based on the assumption that no security is going to be 100% perfect forever, especially if you’ve got nationally vital elements being run through the network. Enemies of the state might love to hack, for example, all the autonomous vehicles in a country. Functional safety means designing the cars so that, even if they’re hacked, or even if they lose their connection, the car won’t just drive into a crowd or anything. And resilience means making sure that, if an attack shuts down one car, it won’t spread easily to other cars and it’s easy to get the attacked car up and running again.Theme 5: A whole new meaning to “headend”At this signpost, the wise man said, you cross over into the Twilight Zone.”What type of mobile devices will disrupt the wireless industry and drive beyond 5G wireless systems in the same manner that the iPhone and the IoT did?” reads an April 2020 white paper produced by IEEE senior and student members [PDF]. Submitted for your approval: Your brain, enhanced through the implanting of a bio-mechanical interface (BMI), within which are probes that make direct contact with the surface.×brain-to-brain-to-6g-link.jpgIEEE Senior Members Pedro Nardelli and Renan Moioli propose the creation of a truly neural network they call BTC. Without the real-world experiments to prove this just yet, they suggest the following: Once it becomes possible for base stations to achieve extremely high-frequency connectivity, the next natural progression may be to take biological devices that already generate natural signals at those frequencies, and interface them with the wireless network. The BTC team wrote:…The shift toward implants is further motivated by several emerging wireless services, such as immersive Extended Reality (XR) and BMI, in which the human body and brain become an integral part of the wireless service. In these services, it will soon become necessary to provide communication links among, not only machines (MTC) and human users (HTC), but also among the brains of different users. Hence, we foresee that BTC will be the next frontier in wireless connectivity… BTC links must be designed in a way to seamlessly connect a human brain to a wireless network and potentially provide two-way communication among the user’s brain implants and the various network and IoT devices. A unique feature of BTC links is that they will require the network to match the capabilities of the human brain — arguably the most powerful computer in the world.The apparent upshot here: Really cool games, for one. Next, of course, comes telepathy, linking brains not only with 6G routers and remote cameras, but other brains. One principal requirement, of course, would be “the most powerful computer in the world,” which immediately recalls scenes from a Douglas Adams novel.All this comes on the heels of efforts by 5G stakeholders, along with scientists, academics, and more than a few journalists, to debunk the myth that 5G sought to implant chips in your brain. Since there is no official 6G wireless standard, we can say for now the same holds true for 6G. There has always been an element of science fiction in any speculation about a future technology — for instance, the implication in any study of quantum entanglement that molecular transport may indeed be possible. Sometimes sci-fi is a useful tool, helping us rediscover where the borderlines of sensibility actually lie.What if there isn’t a 6G?Which leads us to this very relevant question. The stakeholders in wireless networks have a vested interest in maintaining control over the gateways through which their networks are accessed. We talk a lot about communications technology evolving to become more like information technology, where there are many more players in competitive fields, and no single vendor owns the customer. And we observe a variety of technologies on the horizon (most of them real) that provide evidence to that end.But each of these technologies would operate in different spaces, with space itself (outer space) being just one level. The edge, where processing and high-capacity storage takes place closer to the end customer, would be another space. And if fiber optic backhaul must co-exist with both microwave and terahertz line-of-sight relays, ownership of the data distribution network may be partitioned between at least three layers, each with its own supply chain and management scheme.All of this would render it much more difficult for telcos (the Verizons, Vodafones, and Oranges of the world) to claim “ownership” of the wireless customer. So why bother building an economy of scale if the builders themselves are out-scaled? Put another way, why bother with 6G at all?Oliver Korfmacher”I think the subscriber data itself, at least in 5G, at least for a given set of subscribers — say, residential — will remain in one database,” replied Oliver Korfmacher, Vice President for Technology and Telecoms for Stockholm-based telco cloud platform provider Enea, speaking to a 6GWorld panel.  “We’re currently harvesting the benefits from having a single, centralized data management, and we will not turn this away immediately.”In 6G, this might change,” Korfmacher pivoted.  “Very likely, we will see the partitioning of subscriber data between different vendors — [it] will be the next big thing.” Since 5G is built to support user equipment (UE) mobility and roaming (enabling one tower to pick up a signal when a phone moves out of range of a nearby tower), it makes sense to keep UE subscriber data centralized. For any system being envisioned as 6G, he believes, such centralization — which some might call “lock-in” — may not be as necessary.Since holding onto one’s customers remains key to the success of 5G Wireless strategy, 6G might very well co-exist with 5G after all. . . as its competitor.Stated Aaron Boasman-Patel:If we’re going to get to this multi-vendor landscape, we really have to start to understand, how do you componentize the network? Now, that’s never been done before. We spend a lot of time talking about the IT layer, about the interfaces on the radio access network. To make all of this work, we’ve got to ride the way down into the network, which hasn’t traditionally been opened up. There’s lots and lots of vendor lock-in on the network side, and lots of resistence to actually de-componentize that into the different network functions.We put the question to Prof. Henning Schulzrinne of Columbia University — the former CTO of the FCC.  Henning Schulzrinne”I do see that, for at least the foreseeable future, we already have several, and a probably increasing number of, communications standards tracks,” Prof. Schulzrinne told us.  “We’re going to have, currently, the carrier track — 5G from 3GPP, primarily, and related bodies. We’re going to have the enterprise version — largely still Wi-Fi, for the foreseeable future. That I don’t see going away. And increasingly, we’re having specialty networks like a WAN, and similar types of IoT-based, low-bandwidth, long-range, industrial-style networks that are more important, but niche networks, not general-purpose.”Some, perhaps all, of the goals engineers and academics foresee for their respective, bright futures, may happen anyway without either 5G or 6G. And that may be a good thing, if we resume the original concept of a “G” as 3GPP perceived it: the technological specification for the core and accessibility of the wireless network. There may not have to be a split or a chasm among stakeholders, believes Prof. Schulzrinne, if everybody would concentrate on their own respective projects. The professor continued:What I do see as an opportunity — and this is not guaranteed to succeed, is that we currently have a world where the Wi-Fi world and the carrier world are starting to converge, but still, they’re fairly different, so that a company has to make a choice. They’ll may go all-in on carrier-style technology like 5G for the enterprise. But you get the story. It’s still not a majority. It’s still hard to deploy. It requires a level of expertise in communication. You’re pretty much tied to a single vendor at that point — say, Nokia or Ericsson. It’s not well-integrated with enterprise management systems, because they’re designed as carrier-style systems. It’s not integrated with any existing Wi-Fi infrastructure, for a variety of practical and cost reasons. So I do see there is an opportunity — and this may be more of a 6G type of thing — to think more systematically about an architecture that can be scaled down, and more readily occupies the middle ground between a very basic, Wi-Fi access point architecture that we currently have in very small enterprises, and the carrier-grade, carrier-scale, 5G-ish style of architecture that we have.Schulzrinne perceives an opportunity for a radically simplified architecture to occupy this middle ground, between the Wi-Fi router and the 5G tower. Whoever seizes this opportunity, he believes, will need to either train, or be able to train, the managers of these mid-range communications networks. Here is where things get interesting: Do carriers have an interest in cultivating such expertise among their customers? Don’t they run the danger of sacrificing the very element of their service that justifies their premiums? Continues Schulzrinne:There’s a recognition that the carrier industry has to merge towards the enterprise architecture, as opposed to the opposite way. I see that as much more productive, simply because there’s just a lot more enterprise out there, than there is carrier out there, both in terms of numbers of people and numbers of deployed sites. I do see an opportunity there. But it’s too late to do that for 5G.

    [ZDNet acknowledges the superb work of 6GWorld, its managing editor, Alex Lawrence, and his colleagues who set up 6GSymposium and its associated panels.]Further Reading More

  • in

    Surgery digitized: Telesurgery becoming a reality

    There’s been a lot of talk around the topic of telesurgery and how far we are from this being a feasible reality. CEO of Asensus Surgical Anthony Fernando says this future is possible through 5G but this infrastructure has to be available everywhere. Moreover, the fundamentals of robotic-assisted surgical practices need to be widespread before we can progress further. 

    Companies like Asensus have taken steps to digitize the interface between the surgeon and patient through “performance-guided surgery”—the convergence of surgical technology and augmented intelligence. Augmented intelligence enables a robotic-assisted platform to perceive (computer vision), learn (machine learning), and assist (clinical intelligence) in surgery—providing a true digital surgical assistant for the first time. So what does that mean for telesurgery, which is beginning to emerge as a realistic concept? I connected with Anthony Fernando, CEO and President, Asensus Surgical, to find out.GN: What have been the primary hurdles (technological, regulatory, and from a market readiness standpoint) to practical telesurgery?Anthony Fernando: Before we delve into practical telesurgery, let’s first take a look at the current surgical landscape to provide context on the evolution of surgery and how we can achieve telesurgery. Currently, approximately, 40% of surgeries are being done open (invasive), 50% of surgeries being done laparoscopically (less invasive, but harder for the surgeon), and 3-5 % are being done robotically (which yields an unquantified improvement over laparoscopy). So, of the three types of surgery, laparoscopy is most common, with many trained surgeons and strong patient outcomes.By augmenting laparoscopy with some of the benefits of robotics, effectively called Digital Laparoscopy, surgeons and patients can experience the robotic benefits while continuing to leverage their laparoscopic skills.In order to enable telesurgery, the interface between the surgeon and the patient needs to be digitized and the Asensus Surgical’s Senhance system has digitized the interface between the surgeon console and the patient side robotic manipulators with an ethernet style communication interface. In addition, the Senhance system’s Intelligent Surgical UnitTM (ISUTM), is the world’s first and only augmented intelligence and machine vision capable surgical system approved by the FDA for use in robotic-assisted surgery.

    So practical telesurgery can be achieved through current Senhance technology, and 5G will allow that, given high bandwidth and low latency, but you need true 5G. It’s not everywhere, in fact it is only in a fraction of US cities. Once 5G infrastructure is widespread, the conversation about telesurgery will be more realistic and we will have to overcome the regulatory barriers in addition as well.  Moreover, the fundamentals of robotic-assisted surgical practices need to be widespread before we can progress further. GN: Practically, what will telesurgery look like in its early stages with respect to types of procedures, necessary personnel and infrastructure, etc.? What would the benefits be of widespread telesurgery?Anthony Fernando: Surgery today is inconsistent. Surgeons of all skill levels, experience, and training perform similar procedures, but have vastly different outcomes. The Journal of Patient Safety estimates that there are over 400,000 U.S. deaths that occur yearly due to avoidable complications arising from medical errors. This accounts for roughly one-sixth of all deaths in the U.S. each year. Technology-assistance surgery vastly reduces avoidable complications by mitigating surgical variability.With a broader, more robust 5G network, widespread telesurgery has the potential to unlock advanced surgeon training, enhanced surgical collaboration, increased efficiency, and the ability to provide healthcare to remote and underserved areas.As I see it, initially telesurgery will occur inside of a hospital where one surgeon sitting in one room performing 2 or 3 surgeries in different operating rooms in parallel while the support staff in each room assisting the surgeon. This could then be at a hospital system level and could expand to a city, state and finally intercontinentally. In a similar fashion a second surgeon or trainee could join remotely and assist as well.GN: How will 5G support or enable the rollout of telesurgery technologies?Anthony Fernando: True 5G technology is necessary for widespread adoption of telesurgery. It’s the high bandwidth of 5G, low latency and attainment of a fast enough internet connection that will permit telepresence in real time and allow the surgeons to effectively work on the patient as if they were in the same room. Large-scale adoption of this could revolutionize healthcare and surgical treatments around the globe – especially in small hospitals and developing areas that don’t have as much access to top notch healthcare.  Coupled with 5G, robotics provide invaluable assistance, allowing procedures to be performed less invasively, reducing complications and delivery times. GN: Robots are being utilized more and more for a growing variety of surgical techniques. Can you explain how the current applications, including your company’s technology, are paving the way for practical telesurgery?Anthony Fernando: Next-level technology completely changes the idea of what’s possible. As technology enhances and changes the world we live in, we’re able to make inroads in a new era of surgery reimagined. Moving beyond inefficiency, unpredictability and outdated technology in the operating room is a new surgical standard.The digital interface between the surgeon and patient is the key to unlocking telesurgery.Asensus is successfully digitizing surgery and building machine learning algorithms and AI that can enable the future of surgery. For instance, the ISU unlocks the power of computer learning to recognize anatomy, leverages image analytics for the first 3D virtual measurement capability in surgery, and harnesses the power of a virtual assistant to facilitate certain procedures in tandem with the surgeon.The ISU also enables computer vision capabilities for the first time in surgery to make for a smarter surgical decision process. This means this technology records an image and applies intelligent algorithms to enhance the surgeon’s ability to meaningfully use information from the surgical field in real-time.Asensus also offers a telemonitoring platform called Senhance Connect that brings surgical peers together, a feature that became increasingly important during the COVID-19 pandemic. Senhance Connect allows surgical peers from around the world to remotely observe a surgical case being conducted on Asensus’ Senhance Surgical System via cameras and communicate with an expert surgeon about the most advantageous practices. For example, a surgeon can benefit from the expertise of a colleague who specializes in a certain operation.GN: Augmenting human capabilities is an important function of surgical robotics. Do you expect human surgeons to be phased out for some types of procedures in the future? What kind of timescale are we talking about?Anthony Fernando: If you think about good surgery, it’s an art. So digital robotics only enhances and elevates a surgeon’s abilities, but by no means replaces the surgeon. But technology should not just be for the elite. Robotics, AI and machine learning are also bridging any lapse in technical skill and creating an “equal playing field” of surgical expertise across hospital facilities. By providing wider access to expert surgeons via telesurgery, these hospitals can leverage AI-acquired surgeon data to improve ongoing training, providing greater consistency, safety and satisfaction of patients. Our goal is to create a digital twin of a surgeon who can always work alongside a surgeon with the intent of taking the best knowledge and best practices from everywhere and enabling it to be leveraged anywhere. More

  • in

    Ransomware: Russia told to tackle cyber criminals operating from within its borders

    The United States and other G7 countries have warned countries that allow ransomware groups to operate from within their borders, and don’t make any efforts to deter their actions, that they will be held accountable for their lack of action. The warning comes as the leaders of the G7 group of countries have jointly announced a commitment to fight what they described as the global challenge of ransomware.

    ZDNet Recommends

    The declaration – made by Canada, France, Germany, Italy, Japan, the United Kingdom and the United States at the G7 Summit in Cornwall, England – follows a string of high-profile ransomware attacks. SEE: Network security policy (TechRepublic Premium) Organisations that have had their networks encrypted by ransomware in recent weeks include Colonial Pipeline and meat processor JBS. Colonial paid cyber criminals over $4 million in Bitcoin in exchange for the decryption key for DarkSide ransomware, while JBS paid $11 million after getting hacked and having their network encrypted with REvil ransomware. Such is the extent of the problem that US President Joe Biden and the other G7 leaders have vowed to combine forces in an effort to combat ransomware attacks. “We’ve agreed that we’re going to work together to address cyber threats from state and non-state actors like criminal ransomware networks, and hold countries accountable that harbor criminal ransomware actors who don’t hold them accountable,” said President Biden.

    A joint statement published following the G7 Summit specifically calls out Russia to do more when it comes to stopping cyberattacks and to “identify, disrupt, and hold to account those within its borders who conduct ransomware attacks, abuse virtual currency to launder ransoms, and other cyber crimes”. Many of the most notorious ransomware gangs are suspected to operate out of Russia and the consensus among cybersecurity experts is that Russian cyber criminals are allowed to conduct their operations, so long as they don’t target Russians. SEE: This new ransomware group claims to have breached over 30 organisations so far The G7 countries have also vowed to ensure that organisations – particularly those operating critical infrastructure – are secure against cybersecurity threats like ransomware. “The international community—both governments and private sector actors—must work together to ensure that critical infrastructure is resilient against this threat, that malicious cyber activity is investigated and prosecuted, that we bolster our collective cyber defenses, and that States address the criminal activity taking place within their borders,” said a White House statement. “The United States and our G7 partners are committed to working together to urgently address the escalating shared threat from criminal ransomware networks,” the statement added.

    MORE ON CYBERSECURITY More

  • in

    Dentist charged by SEC for digital token project fraud, pump-and-dump AI stock scheme

    The US Securities and Exchange Commission (SEC) has charged a Florida national for his alleged role in three separate securities fraud scams. 

    Edgar Radjabli, a former dentist, controlled Apis Capital Management LLC., marketed as an advisory firm that the SEC says was unregistered. Through this company, Radjabli allegedly controlled Apis Tokens as a managing partner, an offering called the “first tokenized hedge fund” which was based on the Stellar platform.  Apis Tokens were touted as a way for investors to access the ACM Market Neutral Volatility Strategy fund by converting cryptocurrency including Bitcoin (BTC) and Ethereum (ETH) into Apis Tokens and stakes in the fund.  “The offering model of the Apis Token is different from a traditional ICO, as it allows investors to subscribe throughout the month, with the funds collected deployed at month’s end and the tokens simultaneously issued to investors,” the company claimed. In June 2018, Apis Capital said that $1.7 million in funds had been raised and was “allocated to the strategy.” However, the SEC says that no money at all had been secured. By November, the organization said it intended to buy the blockchain AI division from White Company, and in December, Apis Capital claimed that the firm’s investment arm, Apis Ventures, was planning to buy Veritone for $200 million. 

    The claimed deal placed Veritone shares at $10.26 per share, a 93% premium over the closing price on December 7, 2018.  “We are committed to completing this transaction and remain willing to work cooperatively with Veritone,” Radjabli said in a press release at the time. “Our vision for the company involves significant synergy with our growing portfolio of AI and machine learning investments, opening up new opportunities for Veritone’s technology.” Veritone is a publicly traded developer of operating systems for artificial intelligence (AI) solutions.  According to US regulators, “in truth, Radjabli and Apis Capital lacked the financing or any reasonable prospect of obtaining the financing necessary to complete the deal.” Instead, by hyping investor interest with a 93% premium price offering, shares surged — and Radjabli allegedly claimed $162,800 in profit by trading Veritone stock through both Apis Capital and an affiliated fund.  The fraudulent fund claim and the pump-and-dump stock scheme were also joined by a third scam allegedly pulled off by the ex-dentist, who also managed to raise close to $20 million from over 450 investors in an unregistered, fraudulent securities offering. The SEC says that Radjabli launched the offering through My Loan Doctor and told traders that cash raised would be used to find and sell on loans made to healthcare professionals to large investors. Instead, however, the bulk of the funds were allegedly invested in uninsured and unsecured loans, and close to $1.8 million was sent to Apis Capital. Radjabli, Apis Capital, and Loan Doctor have been charged with violating antitrust and securities laws.  A settlement has been agreed, subject to court approval, in which Radjabli and the two entities must pay $600,000 in damages. Conduct-based injunctions would also be put in place and Radjabli would be banned from penny stocks and the securities industry as a whole, if accepted.  Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Volkswagen, Audi disclose data breach impacting over 3.3 million customers, interested buyers

    Volkswagen has revealed a data breach impacting over 3.3 million customers.

    The majority of impacted individuals are either current or prospective buyers for Audi vehicles. 163,000 individuals are in Canada, whereas the rest are in the United States. On Friday, the automaker said that a compilation of data used for sales and marketing purposes between 2014 and 2019 was left unsecured and exposed online “at some point” between August 2019 and May 2021, although the exact timeline has not been established.  An associate vendor has been identified as the source of the breach but the company has not been named. Audi and Volkswagen were alerted that “an unauthorized third party” may have accessed this information on March 10.  Volkswagen says that first and last names, personal and/or business mailing addresses, email addresses, and phone numbers may have been exposed in the breach, alongside information concerning “vehicle[s] purchased, leased, or inquired about,” such as vehicle ID numbers, makes, models, years, and colors. Volkswagen has informed relevant authorities and law enforcement of the data breach. 

    Reuters reports that regulators have been told that the majority of records only relate to phone numbers and email addresses, however, roughly 90,000 Audi customers and potential buyers in the US may have had purchase and lease eligibility data compromised, such as driving license numbers, dates of birth, Social Security numbers, account or loan numbers, and tax identification numbers.  Individuals whose sensitive data has been exposed will be offered free credit monitoring through an enrollment code.  The company says that anyone notified, but not offered this code, did not have information deemed sensitive compromised and so should stay alert for phishing emails or spam based on any of the basic data leaked.  Emails or letters may also be sent to those involved in the security incident who were not direct customers or prospective buyers.  “In a limited number of cases, an Audi or Volkswagen customer or interested buyer provided names and contact information for a relative or personal reference to an authorized dealer for purposes of seeking financing of some kind,” notification partner IDX says.  Volkswagen says that external cybersecurity experts have been pulled in to investigate the incident.  “Audi and Volkswagen are working with third-party cybersecurity experts to assess and respond to this situation and have taken steps to address the matter with the vendor involved,” the firms say.  A help hub has been set up by IDX for those who believe they have been impacted by the data breach.  Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Codecov to retire the Bash script responsible for supply chain attack wave

    Codecov has introduced a new uploader that relies on NodeJS to replace and remove a Bash script responsible for a recent supply chain attack. 

    The San Francisco-based DevOps tool provider said in a blog post that the new uploader will be shipped as a static binary executable suitable for Windows, Linux, Alpine Linux, and macOS. The uploader, used in the same manner as the existing Bash uploader, is used to push coverage data and updates to products during development cycles. The uploader is currently in the Beta stage and so is yet to be fully integrated, but Codecov says that “most standard workflows that are currently accomplished with the Bash Uploader can be accomplished with the new uploader.” Codecov’s Bash uploader was the source of a string of supply chain attacks taking place around January 31, 2021, made public on April 15. By infiltrating Codecov’s network and hijacking the Bash uploader, the threat actors ensured that rather than pushing “healthier” code during project updates, as Codecov intends, users were, instead, subject to the theft of information stored in their continuous integration (CI) environments. The attack may have also allowed the attackers to “raid additional resources,” according to investigators brought in after the breach was made public — including credentials, potentially leading to wider network compromise in some cases. It is thought that hundreds of organizations may have become embroiled in the security incident. Known victims include Rapid7, Monday.com, Mercari, and Twilio. 

    Codecov’s Bash uploader range — the Codecov-actions uploader for Github, CircleCl Orb, and Bitrise Step — were all impacted.  The company says that with the introduction of the new uploader, all other language-specific uploaders will be depreciated, with “special attention” paid to the Bash uploader at fault.  Codecov has been working on the NodeJS uploader for eight months, originally to reduce the increasing complexity of facilitating uploads and maintenance as the Codecov customer base increased.  Now that the Bash script is tied to a severe security incident, however, the upgrade has become an urgent necessity.  “The distribution mechanism of choice (i.e., curl pipe to bash) while incredibly convenient, is notoriously problematic from a security perspective,” Codecov said. “The weaknesses of the curl | bash approach came to the forefront during [the] recent security event.” The new uploader is now available for public use under the Beta umbrella and includes a more secure, verifiable distribution architecture, protections against unauthorized code modification, and an improved CI/CD pipeline for conducting automated testing of the uploader on Windows, Linux, and macOS. Codecov hopes to depreciate the Bash uploader from November, with a full sunset of the system planned for after February 1, 2022. The organization has also outlined other security improvements in the wake of the attacks.    Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More