Part 1 of this two-part serious was about rethinking and reeducation: ‘Attack Scenarios’ approached the transformation process by getting students to think as if they are attacker so that in Part 2; ‘Defence Scenarios’ they are challenged to get ahead of the game; to anticipate and respond ahead of an attack, by recalling what they did in RED Team mode which gave them the opportunity to design their own criminal empire on screen!
In both Part 1 and Part 2 the detailed discussions occurred in camera and are not for publication or open public access.
The past 25 years have seen a move toward the convergence of telephone and computer onto a single network. Whilst the telephone network enjoyed a unique and isolated development (and growth) of dedicated circuit switching for near 200 years, computing more naturally ventured into ethernet (packet switching) and on to the internet in just 55years.
So different are these networking concepts that it was originally thought they could never converge. But as the internet grew to outgun the old fixed telephone network and new mobile working, it became economically and technologically clear that convergence (VOIP) was possible and most likely would be transformational.
Having ‘fixed’ the conundrum of real-time communication using uncontrolled packets that introduce variable latency, a new ‘monster’ reared - cybersecurity! Telephone and mobile nets never suffered ‘hacker attacks’ to the same degree as the PC dominated world and so new provisions had to be made. These came in the form of end-to-end packet encryption and layered link encryption with constraints on the number of end-to-end and node-to-node hops.
Today, telephone calls mostly pass through a portion of the internet, PN, PVN, with a shrinking number still originating and terminating at old analog and digital local loops with circuit switches. By and large, the core network is ‘super secure’ and it is in the new digital and old analogue periphery where the major risks reside. Within the next decade the full transformation to all-digital, packet switching, should be complete.
As per the internet; people, insider, malware, Denial of Service (DoS and DDoS) and other forms of attack persist, but the defences developed to combat these are formidable. In this lecture we address the attack scenarios and the defences to date and highlight some of the lesser-known/advertised approaches of both the defenders and the attackers.
CyberCrime represents one of the biggest threats to society and human progress to be encountered in the past 70 years. As a business, it is by far the biggest on the planet with a balance sheet that would see it joining the G8 within the next 3 years given its continued exponential growth. With these criminal activities only attracting sensational reporting in the context of stolen passwords and account details, society soldiers on not understanding the detail and not understanding the growing threat. Attacks are tolerated in much the same way as a snowstorm!
Military, national defense, and security organizations, along with police and government can no longer cope and are in large part unable to defend and protect their citizens. The IT industry and those engaged in Cyber Defence are struggling too and remain in a reactive defense mode - mostly responding after the fact/act! The Dark Side not only enjoy the first-mover advantage, they are unbounded by the Law, Ethics, or indeed any constraints!
There are also rogue states and terrorists plus many other groups also leveraging the openness of societies to attack, and often straying into/exploiting criminal resources! At the same time the defenders tend to be far and few on the ground, generally underfunded and resourced, and often unappreciated and poorly paid/rewarded. For sure, it is time to rethink this arena and change our thinking on how we approach defense.
This lecture is Part 1 of a rethink/reeducation process: ‘Attack Scenarios’ approaches the transformation process by getting students to think as if they are attacker so that in Part 2; ‘Defence Scenarios’ they can get ahead of the game to anticipate and respond ahead of an attack. This they do in RED Team mode with an opportunity to design their own criminal empire on screen!
No doubt Aldous Huxley and George Orwell would be pleased to see cameras and surveillance devices everywhere, just as they predicted, but they would then be amazed to find that we buy and install them and become upset if no one is watching! So the Dystopian futures they both predicted and feared are not here yet, but they might just be in the pipeline, and being built a device at a time by us!
Only 70 years ago close observation and surveillance was difficult and very expensive. Today, it is so very cheap, efficient, and everywhere: in our pockets; on our wrists; in our homes, offices, cars, trains, planes; in the streets and on the highways and major roads.
To some degree every country has embraced all the possibilities presented by the technology to make their societies safer and more progressive as organisms, but now here comes AI. Automatic voice, face, finger, eye, action, movement and habit recognition writ large along with all our messages, entertainment, work and recreation patterns monitored 24x7, so inference engines can check if we are good, bad, dangerous, safe, under threat and so on!
Some countries are now employing such technology to judge, sentence, and commit people for criminal acts and ant-social behaviours etc. At this point we have to proceed with care in the recognition that data errors ‘happen’ and human biases can be built in at the birth of such AI systems. Nothing is ever perfect - not people, and certainly not our machines, and we have to progressively drive out bias snd error…
From the begging of the industrial revolution, we have built systems and machines on the basis that people will just have to learn about the interface and adjust accordingly. And so the skill of the individual craftsman was overtaken and subverted by the expertise of the ‘operator,’ production line, and mass production enabling us all to do more-and-more with less-and-less, to raise living standards, the health and wealth of individuals and nations.
In effect, we bent humanity into technology to meet the specific needs (and will) of the machines, but to the greater benefit of humanity! But now we stand at the cusp of a new era with AI and Robotics are able to adapt to our individual and most specific needs. That is: machines bend to meet our needs; to empower us as individuals and organisations to do and achieve ever more.
But their remains one last bastion of inconvenience centered on ID and security - often referred to as ‘Password Hell’. We are all awash with multiple Cards, Licences, Visas, Passports, Badges, Codes, PINs, Passwords, User Names, IDs, Log-On, Log-In, Entry, and Exit Protocols! And so it is time to get all of this out of the domain of the human and into the realm of our machines! Today we are in the process of migrating from a nightmare past of our own design, into a biometric world where machines will recognise us and grant us access automatically. And at the fringe some young populations are already being chipped exactly in the same way our pets have been chipped for the past decades.
Apart from the obvious advantage of not having to carry any money or ID of any kind, there is the assurance of extra safety, security and health support wherever we happen to be. It is not available right now, but beyond an ID Chip, we can easily embed, or provide links to, our medical record into the same technology. We, and not just our devices and possessions, also become a part of the IoT!
Of course, for many, they see the threat of a looming dystopian future aka Hollywood! But this will be a choice between convenience and greater security versus what we have today - but that choice has to remain ours! In this presentation we look at the widening spectrum of technologies available and the need to concatenate widely different techniques to exceed the accuracy of DNA and other human/biological parameters
In this lecture is the final session of an extensive wireless course delivered over several weeks at the University of Suffolk. So, by way of ‘rounding-off’ the series, we chart the progression of wireless/radio communication from the first spark transmitters through Carrier -Wave Morse, AM, FM, DSSC, SSB to digital systems along with the use of LW, MW, SW, VHF, UHF and Microwaves. Whilst we focus on Electro-Magnetic-Waves from 30kHz through 300GHz, we also mention optical, ultrasonic, and chemical communication as additional modes.
Our examinations detail the distinct genetic trails of 1, 2, 3G, and 4, 5G, the approximate development cycles/timeline along with distinctive changes in design thinking. We then postulate that 6 and 7G are likely to form a new line of development with 6G probably realised without any towers or any conventional cellular structure. In this context we also point out that there are no digital radios today, only traditional analogue designs with ‘strap-on-modems’ at the transmitter and receiver. Perhaps more radically, we suggest that it is time to adapt fully digital designs that allow for the eradication of the established bands and channels mode of operation.
We also chart the energy hungry progression of systems from 1 through 5G where tower installations are now consuming in excess of 10kW due to the extensive signal processing employed. This immediately debunks any notion of another step in the direction of more bandwidth, lower latency, greater coverage with >20x more towers (than 4G) and >250Bn power hungry smart devices. In short: we propose that 5G is the last of the line and the realisation of 6G demands new thinking and new modes that lead us away from W and mW to µW and nW wireless designs.
Whilst most of the technology required for 6G is available up to 300GHz, there remains one big channel in respect of the growing number of antennas per device and platform. Even for 3 - 5G + WiFi + BlueTooth space is at a premium in mobile devices and fractal antennas have not lived up to their promise too integrate all of these into one wideband structure. However, at 100GHz and above, antennas/dipoles become less than chip size and can see 10s included as phased arrays. But this all needs further work!
Throughout this lecture, we provide examples, demonstrations, and mind-experiments to support our assertions.
We are engaged in an exponentially growing cyber war that we are visibly losing. Within the next 3 years it has been estimated that the global cost will equal, or overtake, the UK GDP, and it is clear that our defences are inadequate and often ineffective. Malware and ransomer-ware continue to extort more money, and cause damage and inconvenience to individuals, organisations and society, whilst hacker groups, criminals and rogue states continue to innovate and maintain their advantage. At the same time, our defences are subverted and rendered ineffective as we operate in a reactive and prescriptive, after the fact, mode with no foresight or anticipation.
In any war it is essential to know and understand as much about the enemy as possible, it is also necessary to establish the truth and validity of any situation or development. Doing this in the cyber domain is orders of magnitude more difficult than the real world, but some of the relevant tools are now available or at an advanced stage of development. For example; fully automated fact checkers and truth engines have been demonstrated, whilst situational awareness technologies are commercially available. However, what is missing is some level of context assessment on a continual basis. Without this we will continue to be ‘blind-sided’ by the actions and developments of the attackers as they maintain their element of surprise along every line of innovation.
What do we need? In short ; a Context Engine that continually monitors networks, servers, routers, machines, devices and people for anomalous behaviours that flag pending attacks as behavioural deviations that are generally easy to detect. In the case of attacker groups we have observed precursor events and trends in network activity days ahead of some big offensive. However, this requires a shift in the defenders thinking and operations away for the reactive and short term, to the long term continual monitoring, data collection and analysis in order to establish threat assessments on a real time.
The behavioural analysis of people, networks and ITC, is at the core of our ‘Context Engine’ solution which completes the triangle of: Truth; Situation; Context Awareness to provide defenders with a fuller and transformative picture. Most of the known precursor elements of this undertaken have been studied in some depth, with some behavioural elements identified on real networks and some physical situations. The unknown can only add more accuracy!
In a world that appears riven by social media, ill-informed opinion, rumour, and conspiracy theories in preference to facts and established truths, it can be alarming to see scientists, doctors, and engineers challenged by vacuous statements that often hold sway over the hard-won truths of science. Moreover, large numbers of people do not understand the ‘scientific method’ and what makes it so powerful.
Paradoxically, those challenging science and scientists based on their belief systems do so using technologies that can only be furnished by scientific methodologies. For sure; no religion, belief system, great political mind, anarchist, professional protester, or social commentator will produce a TV set, mobile phone, laptop, tablet, supercomputer, MRI Scanner, AI system, or vaccine! But they will criticise, challenge, and be abusive based on their ignorance and inability.
So, this is the world that now influences the minds of young aspiring students, and this presentation is designed to go beyond the simple exposition and statement of the scientific principles and method, to provide an ancient, modern, and forward-looking perspective. It also includes a complex ‘worked example’ to highlight the rigour that must be applied to establish any truth!
We are engaged in a war the like of which we have never seen or experienced before. Our enemies are invisible and relentless; with globally dispersed forces working at all levels and in all sectors of our societies. They are better organised, resourced, motivated, and adaptive than any of our organisations or institutions, and they are winning. This war is also one of paradox!
“The cost to many nations is now on a par with their GDP”
“No previous war has seen so many suffer so much to (almost) never retaliate”
“We are up against attackers who operate as a virtual (ghost-like) guerrilla army”
“No state can defend its population and organisations, and they stand alone - isolated and exposed”
“A real army/defence force would rehearse and play all day and very occasionally engage in warfare. We, on the other hand, are at war every day but never play, war-game, or anticipate new forms of attack”
To turn this situation around we need to understand our enemies and adopt their tactics and tools as a part of our defence strategy. We also have to be united, and organised so the no one, and no organisation, stands alone. We also have to engage in sharing attack data, experiences and solutions.
All this has to be supported by wargaming, and anticipatory solutions creation.
The good news is; we have better, and more, people, machines, networks, facilities, and expertise than our enemies. All it requires is the embracing of advanced R&D, leadership, sharing, and orchestration on a global scale.
The past 25 years have seen a move toward the convergence of telephone and computer onto a single network. Whilst the telephone network enjoyed a unique and isolated development (and growth) of dedicated circuit switching for near 200 years, computing more naturally ventured into ethernet (packet switching) and on to the internet in just 55years.
So different are these networking concepts that it was originally thought they could never converge. But as the internet grew to outgun the old fixed telephone network and new mobile working, it became economically and technologically clear that convergence (VOIP) was possible and most likely would be transformational.
Having ‘fixed’ the conundrum of real-time communication using uncontrolled packets that introduce variable latency, a new ‘monster’ reared - cybersecurity! Telephone and mobile nets never suffered ‘hacker attacks’ to the same degree as the PC dominated world and so new provisions had to be made. These came in the form of end-to-end packet encryption and layered link encryption with constraints on the number of end-to-end and node-to-node hops.
Today, telephone calls mostly pass through a portion of the internet, PN, PVN, with a shrinking number still originating and terminating at old analog and digital local loops with circuit switches. By and large, the core network is ‘super secure’ and it is in the new digital and old analogue periphery where the major risks reside. Within the next decade the full transformation to all-digital, packet switching, should be complete.
As per the internet; people, insider, malware, Denial of Service (DoS and DDoS) and other forms of attack persist, but the defences developed to combat these are formidable. In this lecture we address the attack scenarios and the defences to date and highlight some of the lesser-known/advertised approaches of both the defenders and the attackers.
CyberCrime represents one of the biggest threats to society and human progress to be encountered in the past 70 years. As a business, it is by far the biggest on the planet with a balance sheet that would see it joining the G8 within the next 3 years given its continued exponential growth. With these criminal activities only attracting sensational reporting in the context of stolen passwords and account details, society soldiers on not understanding the detail and not understanding the growing threat. Attacks are tolerated in much the same way as a snowstorm!
Military, national defense, and security organizations, along with police and government can no longer cope and are in large part unable to defend and protect their citizens. The IT industry and those engaged in Cyber Defence are struggling too and remain in a reactive defense mode - mostly responding after the fact/act! The Dark Side not only enjoy the first-mover advantage, they are unbounded by the Law, Ethics, or indeed any constraints!
There are also rogue states and terrorists plus many other groups also leveraging the openness of societies to attack, and often straying into/exploiting criminal resources! At the same time the defenders tend to be far and few on the ground, generally underfunded and resourced, and often unappreciated and poorly paid/rewarded. For sure, it is time to rethink this arena and change our thinking on how we approach defense.
This lecture is Part 1 of a rethink/reeducation process: ‘Attack Scenarios’ approaches the transformation process by getting students to think as if they are attacker so that in Part 2; ‘Defence Scenarios’ they can get ahead of the game to anticipate and respond ahead of an attack. This they do in RED Team mode with an opportunity to design their own criminal empire on screen!
No doubt Aldous Huxley and George Orwell would be pleased to see cameras and surveillance devices everywhere, just as they predicted, but they would then be amazed to find that we buy and install them and become upset if no one is watching! So the Dystopian futures they both predicted and feared are not here yet, but they might just be in the pipeline, and being built a device at a time by us!
Only 70 years ago close observation and surveillance was difficult and very expensive. Today, it is so very cheap, efficient, and everywhere: in our pockets; on our wrists; in our homes, offices, cars, trains, planes; in the streets and on the highways and major roads.
To some degree every country has embraced all the possibilities presented by the technology to make their societies safer and more progressive as organisms, but now here comes AI. Automatic voice, face, finger, eye, action, movement and habit recognition writ large along with all our messages, entertainment, work and recreation patterns monitored 24x7, so inference engines can check if we are good, bad, dangerous, safe, under threat and so on!
Some countries are now employing such technology to judge, sentence, and commit people for criminal acts and ant-social behaviours etc. At this point we have to proceed with care in the recognition that data errors ‘happen’ and human biases can be built in at the birth of such AI systems. Nothing is ever perfect - not people, and certainly not our machines, and we have to progressively drive out bias snd error…
From the begging of the industrial revolution, we have built systems and machines on the basis that people will just have to learn about the interface and adjust accordingly. And so the skill of the individual craftsman was overtaken and subverted by the expertise of the ‘operator,’ production line, and mass production enabling us all to do more-and-more with less-and-less, to raise living standards, the health and wealth of individuals and nations.
In effect, we bent humanity into technology to meet the specific needs (and will) of the machines, but to the greater benefit of humanity! But now we stand at the cusp of a new era with AI and Robotics are able to adapt to our individual and most specific needs. That is: machines bend to meet our needs; to empower us as individuals and organisations to do and achieve ever more.
But their remains one last bastion of inconvenience centered on ID and security - often referred to as ‘Password Hell’. We are all awash with multiple Cards, Licences, Visas, Passports, Badges, Codes, PINs, Passwords, User Names, IDs, Log-On, Log-In, Entry, and Exit Protocols! And so it is time to get all of this out of the domain of the human and into the realm of our machines! Today we are in the process of migrating from a nightmare past of our own design, into a biometric world where machines will recognise us and grant us access automatically. And at the fringe some young populations are already being chipped exactly in the same way our pets have been chipped for the past decades.
Apart from the obvious advantage of not having to carry any money or ID of any kind, there is the assurance of extra safety, security and health support wherever we happen to be. It is not available right now, but beyond an ID Chip, we can easily embed, or provide links to, our medical record into the same technology. We, and not just our devices and possessions, also become a part of the IoT!
Of course, for many, they see the threat of a looming dystopian future aka Hollywood! But this will be a choice between convenience and greater security versus what we have today - but that choice has to remain ours! In this presentation we look at the widening spectrum of technologies available and the need to concatenate widely different techniques to exceed the accuracy of DNA and other human/biological parameters
In this lecture is the final session of an extensive wireless course delivered over several weeks at the University of Suffolk. So, by way of ‘rounding-off’ the series, we chart the progression of wireless/radio communication from the first spark transmitters through Carrier -Wave Morse, AM, FM, DSSC, SSB to digital systems along with the use of LW, MW, SW, VHF, UHF and Microwaves. Whilst we focus on Electro-Magnetic-Waves from 30kHz through 300GHz, we also mention optical, ultrasonic, and chemical communication as additional modes.
Our examinations detail the distinct genetic trails of 1, 2, 3G, and 4, 5G, the approximate development cycles/timeline along with distinctive changes in design thinking. We then postulate that 6 and 7G are likely to form a new line of development with 6G probably realised without any towers or any conventional cellular structure. In this context we also point out that there are no digital radios today, only traditional analogue designs with ‘strap-on-modems’ at the transmitter and receiver. Perhaps more radically, we suggest that it is time to adapt fully digital designs that allow for the eradication of the established bands and channels mode of operation.
We also chart the energy hungry progression of systems from 1 through 5G where tower installations are now consuming in excess of 10kW due to the extensive signal processing employed. This immediately debunks any notion of another step in the direction of more bandwidth, lower latency, greater coverage with >20x more towers (than 4G) and >250Bn power hungry smart devices. In short: we propose that 5G is the last of the line and the realisation of 6G demands new thinking and new modes that lead us away from W and mW to µW and nW wireless designs.
Whilst most of the technology required for 6G is available up to 300GHz, there remains one big channel in respect of the growing number of antennas per device and platform. Even for 3 - 5G + WiFi + BlueTooth space is at a premium in mobile devices and fractal antennas have not lived up to their promise too integrate all of these into one wideband structure. However, at 100GHz and above, antennas/dipoles become less than chip size and can see 10s included as phased arrays. But this all needs further work!
Throughout this lecture, we provide examples, demonstrations, and mind-experiments to support our assertions.
We are engaged in an exponentially growing cyber war that we are visibly losing. Within the next 3 years it has been estimated that the global cost will equal, or overtake, the UK GDP, and it is clear that our defences are inadequate and often ineffective. Malware and ransomer-ware continue to extort more money, and cause damage and inconvenience to individuals, organisations and society, whilst hacker groups, criminals and rogue states continue to innovate and maintain their advantage. At the same time, our defences are subverted and rendered ineffective as we operate in a reactive and prescriptive, after the fact, mode with no foresight or anticipation.
In any war it is essential to know and understand as much about the enemy as possible, it is also necessary to establish the truth and validity of any situation or development. Doing this in the cyber domain is orders of magnitude more difficult than the real world, but some of the relevant tools are now available or at an advanced stage of development. For example; fully automated fact checkers and truth engines have been demonstrated, whilst situational awareness technologies are commercially available. However, what is missing is some level of context assessment on a continual basis. Without this we will continue to be ‘blind-sided’ by the actions and developments of the attackers as they maintain their element of surprise along every line of innovation.
What do we need? In short ; a Context Engine that continually monitors networks, servers, routers, machines, devices and people for anomalous behaviours that flag pending attacks as behavioural deviations that are generally easy to detect. In the case of attacker groups we have observed precursor events and trends in network activity days ahead of some big offensive. However, this requires a shift in the defenders thinking and operations away for the reactive and short term, to the long term continual monitoring, data collection and analysis in order to establish threat assessments on a real time.
The behavioural analysis of people, networks and ITC, is at the core of our ‘Context Engine’ solution which completes the triangle of: Truth; Situation; Context Awareness to provide defenders with a fuller and transformative picture. Most of the known precursor elements of this undertaken have been studied in some depth, with some behavioural elements identified on real networks and some physical situations. The unknown can only add more accuracy!
In a world that appears riven by social media, ill-informed opinion, rumour, and conspiracy theories in preference to facts and established truths, it can be alarming to see scientists, doctors, and engineers challenged by vacuous statements that often hold sway over the hard-won truths of science. Moreover, large numbers of people do not understand the ‘scientific method’ and what makes it so powerful.
Paradoxically, those challenging science and scientists based on their belief systems do so using technologies that can only be furnished by scientific methodologies. For sure; no religion, belief system, great political mind, anarchist, professional protester, or social commentator will produce a TV set, mobile phone, laptop, tablet, supercomputer, MRI Scanner, AI system, or vaccine! But they will criticise, challenge, and be abusive based on their ignorance and inability.
So, this is the world that now influences the minds of young aspiring students, and this presentation is designed to go beyond the simple exposition and statement of the scientific principles and method, to provide an ancient, modern, and forward-looking perspective. It also includes a complex ‘worked example’ to highlight the rigour that must be applied to establish any truth!
We are engaged in a war the like of which we have never seen or experienced before. Our enemies are invisible and relentless; with globally dispersed forces working at all levels and in all sectors of our societies. They are better organised, resourced, motivated, and adaptive than any of our organisations or institutions, and they are winning. This war is also one of paradox!
“The cost to many nations is now on a par with their GDP”
“No previous war has seen so many suffer so much to (almost) never retaliate”
“We are up against attackers who operate as a virtual (ghost-like) guerrilla army”
“No state can defend its population and organisations, and they stand alone - isolated and exposed”
“A real army/defence force would rehearse and play all day and very occasionally engage in warfare. We, on the other hand, are at war every day but never play, war-game, or anticipate new forms of attack”
To turn this situation around we need to understand our enemies and adopt their tactics and tools as a part of our defence strategy. We also have to be united, and organised so the no one, and no organisation, stands alone. We also have to engage in sharing attack data, experiences and solutions.
All this has to be supported by wargaming, and anticipatory solutions creation.
The good news is; we have better, and more, people, machines, networks, facilities, and expertise than our enemies. All it requires is the embracing of advanced R&D, leadership, sharing, and orchestration on a global scale.
Every Industrial revolution has seen the progression from people dominated design, build and production to a higher degrees of automation that has gone hand-in-hand with shortening timescales enabled by ever-more powerful technologies. However, at a fundamental level the process has remained the same, but it is now edging toward a continuum of evolution as opposed to a series of discrete jumps that often trigger company reorganizations. In concert, there is a realization abroad that it is no longer about the biggest, the strongest, the best, or the fittest, it is now all about the survival of the most adaptable.
By and large it is relatively easy to predict when and where tech change will occur and the likely outcomes, in terms of existing and future products and services, but how people, customers, companies and societies will react is an unsolved puzzle. On another plane, competition and threats may well occur outside the sector, from a direction managers are not looking, by entirely new mechanisms, and at a most critical time. These are all challenges indeed!
How to adapt to, and cope with these collective challenges is the focus of this presentation which is illustrated and supported by past and present industrial cases along with the experiences and methodologies of those who have driven/weathered this storm as well as those who failed. Many of the illustrations are automated and there are exemplar movies and segue inserts throughout.
The migration of the fundamentally analogue telephone from a circuit switched network to one essential designed for machine communications based on packet switching has not been entirely comfortable. It was not at all obvious that it might work, or indeed, that it might even be possible given the sensitivity of the human ear and mind to artificiality, noise and latency.
After serving humanity for well over 100 years the analogue telephone network and devices have been overtaken by mobile computing devices offering far more facilities and power. So, despite the detailed testing, and charactering of human speech, the design and modelling of device and network abilities, we are saying goodbye to this past.
During to past 40 years a new world has emerge with intelligence and computing power at the edge of networks and not at the core. Layering speech and video on this new ‘internet’ has been a challenge, but now the performance and economics are more than viable. So, in this lecture we trace this history of development and illustrate the tech challenges with a series of audio demonstrations.
In short, we highlight the nature and impact of bandwidth, signal-to-noise ratio, latency, and packet loss through the old analogue to the new digital eras. We also present some ‘off piste’ examples of military and aircraft communications. Throughout we also highlight the key design directions designs, failures and flaws.
This presentation was created in support of a short keynote for ICGS3-21 (14-15 Jan21) UK to purposely highlight the reasons why we are losing the cyber war and what we have to do to win. The approach adopted quantifies the key weakness and shortcomings of our current defence strategies to give pointers to a more secure future.
In postulating remedies, we purposely fall back on the wisdoms of Sun Tzu and The Art of War to highlight and explain the meaning and implications of quoted insights (below) and their pertinence to modern cyber wars/security.
“To know your Enemy, you must become your Enemy”
In this way, we go beyond opinion and suspicion by quantifying the scale of the individual elements of the cyber security equation using a variant of Drake’s Equation. This gives us a good estimate of the scale of the problems we face. Beyond this we highlight some cultural and political issues that need urgent attention.
Finally, we link to comprehensive presentations going back to 2016 that detail specific Red and Blue team exercises thinking and preparation. These themes were invoked to widen the awareness and thinking in the student body @ The UoS.
"Demystifying a world of the weird and unexpected"
In just over 100 years our understanding of reality, nature, and the world about us has transited from the simple, linear and causal, to the complex, non-linear, and confounding. As a species, we now understand something of the scale of the problems we face and the limitations of our innate abilities. In addition, our mathematical and digital computing frameworks do not scale to match the challenges of climate change, global warming, or the economics of sustainability.
‘Quantum Computing is analogue/probabilistic and not digital’
The stark reality is; We will never understand the human brain, the true nature of cancer, chemistry, biology, life, and the complexities of the environment using today’s tools. Building bigger and better digital computers does not scale to meet these challenges, and is untenable in the longer term! For sure, AI can help us formulate new enlightenments, but it still isn’t enough. We occupy a quantum universe that cannot be decoded and understood by us or our linear machines, no matter how many or how big! A Quantum universe demands Quantum Computers to realize deep understandings.
‘Quantum Computers will not replace our digital computers
In this multi-media talk we open the ‘quantum kimono of reality’ to explain the what, how, and when, of Quantum Machines and the implications for the future.
It has been estimated that the global earnings of Cyber Criminals will equal or exceed the GDP of the UK sometime in the 2022/23 window. If this was the capability of a country they would be joining the G8! Clearly, we are losing the Cyber War hands down, and the time has long passed when we might ignore the threat scenarios surrounding us.
In this lecture we examine global networks from home and office through the ‘last mile,’ and on to national and international networks to identify the key vulnerabilities and points of potential ingress. We identify the cyber risks as escalating as we approach the periphery of all forms of network. For the most part, the core/carrier networks are virtually unassailable physically as they are dominated by terrestrial and undersea optical fibre cables.
Throughout the ‘carrier’ network levels the difficulty of physical interception, encryption, routing, and path diversity employed renders them secure in the extreme. Attackers, therefore, tend to focus on the exploitation of people, devices, services, home, and office appliances, and latterly, a poorly engineered IoT.
In reality, we are expanding the attack surface of the planet exponentially without due caution or care in the most exposed sectors and locations. And so, we explore potential tech and operational solutions for the future.
NOTE: This lecture is one of a series that has examined technology design and deployment, devices and the IoT, people fallibility, deviousness, internal and external threats.
In class; RED and BLUE Team Exercises have also been conducted in support of the complete Cyber Security Package to date.
Our communications history is dominated by fixed networks of bounded linear predictability. These were based on precise engineering design giving assured information security, and measured operation. However, mobile devices, internet, social networks, IP, and Apps changed all that! Internets are inherently non-linear, unbounded, and essentially designoid — that is, mostly shaped by evolution, steered by demand/rapid innovation - highly adaptive and ‘learning’ in real time.
So, those who suppose we can control such networks to fully guard and protect the information of institutions and individuals are sadly mistaken. And further confounded by Industry 4.0 and the Internet of Things (IoT). Here, a mix of the information of individuals and things, is distributed across the planet on a scale far larger than ever conceived in the past, to become essential components in the survival of our species in realising sustainable societies.
Not surprising then, Privacy and Data protection are big issues for regulators, governments and civil liberties organisations. But so far, nothing has worked, and we see the UK Data Protection Act, EU-GDPR, EU-USA Shield, and Copyright Laws often ignored or worked around. These are largely derivatives of a paper based world and a pre-computing world are now largely unfit for purpose.
The majority of cyber attacks against organisations and peoples start with general data about their targets, or very specific data, about one individual who can be used as an access portal to everyone, and everything! Sadly, the majority of attacks appear to be founded on known and published, or simple/very weak passwords that here easy to guess or crack with modest tools.
“I think we can safely assume; ‘Joe Public’ has little knowledge of cyber-security and even less inclination to engage in good security practices. And so, we have a ubiquitous security risk at every level of society with no hope of curing the problem through education and training”
This is compounded by vast libraries of professional papers, web sites, and industry studies that proffer a somewhat confusing range of guidelines and advice largely invisible to, and unhelpful for, the lay population. Probably the ultimate long term solution, in the face of an enemy that is becoming more sophisticated, powerful, and determined by the day, is the full automation through built in biometrics based on face, hand, finger, voice, typing patterns et al. plus a PIN and simple password/’n' factor authentication.
For sure we need an industry based fix; and probably in the form of ‘security as a service’. In the meantime, this presentation addresses what it takes to create ‘fit-for-purpose’ passwords at a device level and on up through Cloud Working. The techniques and guidelines give an assured security spanning trivial documentation through to financial services and state secrets applicable for 2019/20/21. For 2021/22/23 it would be prudent to reassess the advance in attack technologies and techniques, and the change in the success statistics of the Dark Side. It is quite likely that passwords may need strengthening by the addition of additional characters in some cases.
Links to associated/related/earlier slide sets are also provided.
Every profession, along with education courses, has now been parsed into specialisms - as series of ‘soda straws’ or pipes giving a narrow view and focus with little chance of ‘cross-pollination’. Even IT and Systems Security is now sliced into many different facets spanning coding and encryption through to malware; electronic and physical attacks; technology and people.
Covering all of these specialisms in a single course can be difficult let alone a single lecture. But this lecture attempts to do just that (or at least a large slice of it) in a 3-hour session of two 90min sessions. It is done so against the backdrop of an established set of Security Laws.
The primary objective is to give the student a broad view of the wider threats and how they are perpetrated and linked together. Some technical aspects are not explicitly included, but they are reserved for other detailed sessions.
For the vast majority of history the progress of our species and civilisation was limited by a very few artisans - the workers of metal, wood, leather and cloth along with famers and distribution networks. Specifically, the number of skilled blacksmiths determined the rate of sword, knife, lance and armour production, and ultimately the size of empires.
The turning point came in the eaten 1700s when the Royal Navy was expanding to explore and colonies the planer. Nails were the problem with more than 20k required per ship! So this was the first item to be mad automatically, followed by wooden blocks for the rigging. The water mills constructed to power the production therefore mark the start of Industry 1.0 and the growth of the British Empire.
The spread of automation through Industry 2, 3 and 4 accelerated and empowered us to do more and more using less and less people, power and materials. Without it we could not support the population of the planet or the lifestyle we enjoy. Remarkably, at no time during this process have we seen mass unemployment, and consistently, more and more jobs have been created. In brief, better production capabilities have seen the creation of better tools, which in turn has led to better productivity and better quality.
The process has been evident in everything hardware, and much of entertainment ,design, and software, with services perhaps the last bastion of human based delivery and support. However; the on-line world and rise of AI are now changing the balance across retail, banking, insurance, accountancy, and services in general.
Industries 1.0, 2.0 (and most of) 3.0, saw manufacturing and construction using natural materials readily extracted, refined, amalgamated, machined, and molded. In general, these exhibited fixed mechanical, electrical, and chemical properties. However, the latter stages of Industry 3.0 embraced synthetics exhibiting superior properties to afford new degrees of freedom in the design of structures and products.
Today Industry 4.0 sees further advances with metamaterials, dynamic coatings, controllable properties, and additive manufacturing. Embedded smarts have also made communication between components, products and structures possible under the guise of the IoT. Adaptable materials with a degree of self-repair are also opening the door to further freedoms and less material use. In combination, these represent a big step toward sustainable societies with highly efficient ReUse, RePurposing, and Recycling (3R).
At the leading edge, we are now realising active surfaces that can reflect, absorb, or amplify wireless signals, offer programmable colour, and integral energy storage. But amongst a growing list of possibilities, it is integral sensing & communication that may define this new era. In this presentation, we look at these advances in the context of smart design, cities & societies.
For millennia we have crafted artifacts from bulk materials that we have progressively refined to produce ever more precision tools and products. Latterly, we have crossed a critical threshold where our abilities now eclipse Mother Nature. For example; the smallest transistors in production today have feature sizes down to 2nm which is smaller than a biological virus ~20 - 200nm. The implications for ITC, AI, Robotics, and Production are ever more profound as we approach, and most likely undercut, the scale of the atom ~ 0.1-0.4nm. Not only does this open the door to new technologies, it sees new and remarkable capabilities. So, in this presentation we look at this new Tech Horizon spanning robotics to quantum computing and sensory technologies, and how they will help us realise sustainable futures germane to Industry 4.0, 5.0, and beyond.
The ‘glue’ that binds life and the universe into a coherent matrix - there is far more to Bytes than just bits, communication, storage and perception!
Big Data, Small Data, Information; storage and transmission; immediately conjure a picture of ‘potential high confusion’. But Information Theory is here to help us despite it upsetting the ‘purists’ of other disciplines; for it ‘steals’ the ideas and concepts of fundamental physics to apply them in a new and novel way that some would consider ‘fuzzy and sloppy’.
“What passes as information theory today is not communication at all, but merely transportation. ... Information theory was developed by Claude E. Shannon to find fundamental limits on signal processing operations such as compressing data and on reliably storing and communicating data.”
Non-the-less, as a practical theory, it played a key role in empowering the telecoms, coding and computing revolutions by defining the limits of what is possible, what can and can’t be done. Without out this theory we would be engaged in blind engineering - trial and error, rules of thumb, and guessing!
The prime contention is the use of ‘Entropy’ as a practical measure of order and disorder outside the confines of Thermodynamics. Thankfully, Shannon assumed the edict: just because something is not pure, and perfect, doesn’t mean to say we can’t exploit it!
This tutorial therefore details the thinking and justifies the principles so that students may utilise the many facets in the design and practice of information system engineering. Specifically: digital transmission over copper, fibre and wireless, data storage in all media, image processing and display, signal coding, information encryption, and security.
Throughout our education and life we are mostly given a ‘soda-straw’ view of Maths, Physics, Chemistry, Biology, HealthCare, Business and Commerce that conditions us to ‘one concept at a time’ thinking. This is rife in Government and Politics, Industry and Health, and it has been extremely powerful in a now past slow paced and disconnected world. In fact, the speciation of disciplines, topics and problems has largely been responsible for the acceleration and prominence of human progress.
However; in a connected/networked, highly mobile, and tech driven world this simple and narrow minded view is insufficient and dangerous. In common parlance we refer to ‘unintended consequences’ whilst in complex system theory would use the term ‘emergent behaviours’. In brief; education, health, crime, productivity, GDP creation, social cohesion and stability cannot be considered independent variables/properties. They are all related and interdependent. For example; when politicians decide to starve the education system of funds for very young children the impact shows up in health, crime and the economy some 10 - 30 years later!
By analogy; all of this is true of our technologies, industries, lives, and the prospect of sustainable societies. Robots, AI, AL, and Quantum Computing do not stand alone in isolation, they have complementary roles. In this Public Lecture we devote an hour to thinking more holistically what these technologies bring to the party in the context of industry, health, society, sustainable societies and global warming. We then devote a further hour to discussion and debate.
In the context of Global Warming we make the following overriding observations:
“Panic is a poor substitute for thinking”
“Tech is the only exponential capability we enjoy”
“Technology is never a threat, but humans always are”
“Uncertainty always prescribes the precautionary principle”
We are living through an extraordinary pandemic (CV-19) that has changed all the network norms including the way we work and communicate. An invisible consequence has been the transformation of internet and telecoms traffic promoted by people working from home, restrictions on all travel and a paralysis of almost all social norms. Living and working in isolation for 3 - 5 months has become the new mode for many, and even the most technophobic have had to turned to video conferencing and on-line purchases to ‘survive’
From a network point of view the transition has seen the concentrations of traffic in major cities and towns mutate to the dispersed and disparate working, social and entertainment activities that have found the last mile wanting. Insufficient bandwidth connectivity and resilience have quickly become a prime concern with the overloading of core networks a lesser concern.
Installing new optical links and making the core (undersea and overland long-lines) networks more robust is relatively easy as they are by far the most resilient and secure of our infrastructures. It is the local loop, our last mile, that poses the hard to fix problem. In this session we present tested model solutions based on direct ‘dark-fibre’ to home and office with no electronics, splitters or access points in the field. This is augmented by Mesh-Nets and 4/5G providing temporary bridges for random fibre breaks and cable damage.
Education systems across the West have degenerated into a series of memory tests and the quest to hit abstract performance targets and measures. So students that appear well qualified are often unable to apply the most basic of mathematical, scientific, engineering or logical principles, and nor do they have a good appreciation of history or design. This does not bode well for a future of faster change and greater complexity.
“At the most basic level our society it is about the survival of the most adaptable”
For sure; today’s education and learning methodologies have to move toward more experimental and experiential working in order to reinforce the basics whilst engendering far greater understanding. Early specialism has also to be reversed with all students studying a broader range of topics through school and on into college and/or university.
“Education isn’t something you have to get done and dusted - it is a lifelong pursuit”
There is a further need to recognize that the (so-called) academic and practical streams are afforded equal importance! To get the best out of teams/groups all members have to share a common base of understanding and appreciation. In turn, this can be enabled and supported by Just-in-Time education and training-on-line. But there is much more….
Seventy years on from AI appearing on the public scene and all the optimistic projections have been largely overtaken with systems outgunning humans at all board, card and computer games including Chess, Poker and GO. Of course; general knowledge, medical diagnosis, genetics and proteomics, image and pattern recognition are now all firmly in the grasp of AI.
Interestingly, AI is treading a similar path to computing in that it began with single purpose/task machines that could only deal with a company payroll calculations or banking transactions and nothing more! General purpose computing emerged over further decades to give us the PCs and devices we now enjoy. So, AI currently runs as task specific applications on these general purpose platforms, and no doubt, general purpose AI will also become tractable in a few decades too!
Recent progress has promoted a deal of debate and discussion along with hundreds of published papers and definitions that attempt to characterise biological and artificial intelligence. But they all suffer the same futility and fail! Without reference to any formal characterisation, all discussion and debate remains relatively meaningless.
Somewhat ironically, it was the defence industry that triggered the analysis work here. Two of key steps to success were: the abandonment of all performance comparisons between biological and machine entities; and the avoidance of using the human brain as some ‘golden’ intelligence reference.
This presentation is suitable for professionals and public alike, and comes fully illustrated by high quality graphics, animations and movies. Inevitably, it contains (engineering) mathematics that non-practitioners will have to take on trust, whilst professionals may wish challenge on the basis that the focus on getting a solution rather than the purity of the process!
This presentation was delivered by the INDPETH Network (Nana Oye) to a workshop at the Liverpool School of Tropical Medicine on improving the use of research in policy and practice.
Workshop on getting to grips with digital strategy by thinking like a network. Understanding complex adaptive systems, terminology, exponential growth and how technology, behaviour and design all come together. Two exercises included are Stinky Fish and Jobs to be Done. Lots of stuff on Netflix in there too.
Only 40 years ago, the rate of technologically driven change was such that companies could re-organize efficiently and economically over considerable periods of time, but about 30 years ago this changed as the arrival of new technologies accelerated. We effectively moved from a world of slow periodic changes to one where change became a continuum. The leading-edge sectors were fast to recognize and adopt this new mode of continual adaptation driven by new technologies. This saw these ever more efficient and expansive companies dominating some sectors. For the majority, however, it seems that this transition was not recognized until relatively recently, and a so new movement was born under the banner of digitalization. This not only impacts the way people work, it affects company operations and changes markets, and it does so suddenly!.
Perhaps the most impactive and recent driver of change in this regard has been COVID which saw the adoption of video conferencing and working as a survival imperative in much less than a month. This now stands as a beacon of proof that companies, organizations, and society, can indeed change and adapt to the new at a rate previously considered impossible. The big danger for digitalization programmes now is the simple-minded view that there are singular (magic) solutions that fit every company and organization, but this is not the case. The reality is that the needs and culture of an organization are not the same and may not be uniform from top to bottom.
Manufacturing necessitates very steep hierarchical management structures and tight control to ensure the consistency of the quality of products. On the other hand, a research laboratory or design company requires a low flat management hierarchy and an apparently relaxed level of control. This is absolutely necessary to foster creativity, innovation, and invention. This presentation gives practical examples of management and organizational, extremes. We then go on to highlight the need to embrace AI and Quantum Computing over the coming decade to deal with future technologies, operating
and market complexity.
Every Industrial revolution has seen the progression from people dominated design, build and production to a higher degrees of automation that has gone hand-in-hand with shortening timescales enabled by ever-more powerful technologies. However, at a fundamental level the process has remained the same, but it is now edging toward a continuum of evolution as opposed to a series of discrete jumps that often trigger company reorganizations. In concert, there is a realization abroad that it is no longer about the biggest, the strongest, the best, or the fittest, it is now all about the survival of the most adaptable.
By and large it is relatively easy to predict when and where tech change will occur and the likely outcomes, in terms of existing and future products and services, but how people, customers, companies and societies will react is an unsolved puzzle. On another plane, competition and threats may well occur outside the sector, from a direction managers are not looking, by entirely new mechanisms, and at a most critical time. These are all challenges indeed!
How to adapt to, and cope with these collective challenges is the focus of this presentation which is illustrated and supported by past and present industrial cases along with the experiences and methodologies of those who have driven/weathered this storm as well as those who failed. Many of the illustrations are automated and there are exemplar movies and segue inserts throughout.
The migration of the fundamentally analogue telephone from a circuit switched network to one essential designed for machine communications based on packet switching has not been entirely comfortable. It was not at all obvious that it might work, or indeed, that it might even be possible given the sensitivity of the human ear and mind to artificiality, noise and latency.
After serving humanity for well over 100 years the analogue telephone network and devices have been overtaken by mobile computing devices offering far more facilities and power. So, despite the detailed testing, and charactering of human speech, the design and modelling of device and network abilities, we are saying goodbye to this past.
During to past 40 years a new world has emerge with intelligence and computing power at the edge of networks and not at the core. Layering speech and video on this new ‘internet’ has been a challenge, but now the performance and economics are more than viable. So, in this lecture we trace this history of development and illustrate the tech challenges with a series of audio demonstrations.
In short, we highlight the nature and impact of bandwidth, signal-to-noise ratio, latency, and packet loss through the old analogue to the new digital eras. We also present some ‘off piste’ examples of military and aircraft communications. Throughout we also highlight the key design directions designs, failures and flaws.
This presentation was created in support of a short keynote for ICGS3-21 (14-15 Jan21) UK to purposely highlight the reasons why we are losing the cyber war and what we have to do to win. The approach adopted quantifies the key weakness and shortcomings of our current defence strategies to give pointers to a more secure future.
In postulating remedies, we purposely fall back on the wisdoms of Sun Tzu and The Art of War to highlight and explain the meaning and implications of quoted insights (below) and their pertinence to modern cyber wars/security.
“To know your Enemy, you must become your Enemy”
In this way, we go beyond opinion and suspicion by quantifying the scale of the individual elements of the cyber security equation using a variant of Drake’s Equation. This gives us a good estimate of the scale of the problems we face. Beyond this we highlight some cultural and political issues that need urgent attention.
Finally, we link to comprehensive presentations going back to 2016 that detail specific Red and Blue team exercises thinking and preparation. These themes were invoked to widen the awareness and thinking in the student body @ The UoS.
"Demystifying a world of the weird and unexpected"
In just over 100 years our understanding of reality, nature, and the world about us has transited from the simple, linear and causal, to the complex, non-linear, and confounding. As a species, we now understand something of the scale of the problems we face and the limitations of our innate abilities. In addition, our mathematical and digital computing frameworks do not scale to match the challenges of climate change, global warming, or the economics of sustainability.
‘Quantum Computing is analogue/probabilistic and not digital’
The stark reality is; We will never understand the human brain, the true nature of cancer, chemistry, biology, life, and the complexities of the environment using today’s tools. Building bigger and better digital computers does not scale to meet these challenges, and is untenable in the longer term! For sure, AI can help us formulate new enlightenments, but it still isn’t enough. We occupy a quantum universe that cannot be decoded and understood by us or our linear machines, no matter how many or how big! A Quantum universe demands Quantum Computers to realize deep understandings.
‘Quantum Computers will not replace our digital computers
In this multi-media talk we open the ‘quantum kimono of reality’ to explain the what, how, and when, of Quantum Machines and the implications for the future.
It has been estimated that the global earnings of Cyber Criminals will equal or exceed the GDP of the UK sometime in the 2022/23 window. If this was the capability of a country they would be joining the G8! Clearly, we are losing the Cyber War hands down, and the time has long passed when we might ignore the threat scenarios surrounding us.
In this lecture we examine global networks from home and office through the ‘last mile,’ and on to national and international networks to identify the key vulnerabilities and points of potential ingress. We identify the cyber risks as escalating as we approach the periphery of all forms of network. For the most part, the core/carrier networks are virtually unassailable physically as they are dominated by terrestrial and undersea optical fibre cables.
Throughout the ‘carrier’ network levels the difficulty of physical interception, encryption, routing, and path diversity employed renders them secure in the extreme. Attackers, therefore, tend to focus on the exploitation of people, devices, services, home, and office appliances, and latterly, a poorly engineered IoT.
In reality, we are expanding the attack surface of the planet exponentially without due caution or care in the most exposed sectors and locations. And so, we explore potential tech and operational solutions for the future.
NOTE: This lecture is one of a series that has examined technology design and deployment, devices and the IoT, people fallibility, deviousness, internal and external threats.
In class; RED and BLUE Team Exercises have also been conducted in support of the complete Cyber Security Package to date.
Our communications history is dominated by fixed networks of bounded linear predictability. These were based on precise engineering design giving assured information security, and measured operation. However, mobile devices, internet, social networks, IP, and Apps changed all that! Internets are inherently non-linear, unbounded, and essentially designoid — that is, mostly shaped by evolution, steered by demand/rapid innovation - highly adaptive and ‘learning’ in real time.
So, those who suppose we can control such networks to fully guard and protect the information of institutions and individuals are sadly mistaken. And further confounded by Industry 4.0 and the Internet of Things (IoT). Here, a mix of the information of individuals and things, is distributed across the planet on a scale far larger than ever conceived in the past, to become essential components in the survival of our species in realising sustainable societies.
Not surprising then, Privacy and Data protection are big issues for regulators, governments and civil liberties organisations. But so far, nothing has worked, and we see the UK Data Protection Act, EU-GDPR, EU-USA Shield, and Copyright Laws often ignored or worked around. These are largely derivatives of a paper based world and a pre-computing world are now largely unfit for purpose.
The majority of cyber attacks against organisations and peoples start with general data about their targets, or very specific data, about one individual who can be used as an access portal to everyone, and everything! Sadly, the majority of attacks appear to be founded on known and published, or simple/very weak passwords that here easy to guess or crack with modest tools.
“I think we can safely assume; ‘Joe Public’ has little knowledge of cyber-security and even less inclination to engage in good security practices. And so, we have a ubiquitous security risk at every level of society with no hope of curing the problem through education and training”
This is compounded by vast libraries of professional papers, web sites, and industry studies that proffer a somewhat confusing range of guidelines and advice largely invisible to, and unhelpful for, the lay population. Probably the ultimate long term solution, in the face of an enemy that is becoming more sophisticated, powerful, and determined by the day, is the full automation through built in biometrics based on face, hand, finger, voice, typing patterns et al. plus a PIN and simple password/’n' factor authentication.
For sure we need an industry based fix; and probably in the form of ‘security as a service’. In the meantime, this presentation addresses what it takes to create ‘fit-for-purpose’ passwords at a device level and on up through Cloud Working. The techniques and guidelines give an assured security spanning trivial documentation through to financial services and state secrets applicable for 2019/20/21. For 2021/22/23 it would be prudent to reassess the advance in attack technologies and techniques, and the change in the success statistics of the Dark Side. It is quite likely that passwords may need strengthening by the addition of additional characters in some cases.
Links to associated/related/earlier slide sets are also provided.
Every profession, along with education courses, has now been parsed into specialisms - as series of ‘soda straws’ or pipes giving a narrow view and focus with little chance of ‘cross-pollination’. Even IT and Systems Security is now sliced into many different facets spanning coding and encryption through to malware; electronic and physical attacks; technology and people.
Covering all of these specialisms in a single course can be difficult let alone a single lecture. But this lecture attempts to do just that (or at least a large slice of it) in a 3-hour session of two 90min sessions. It is done so against the backdrop of an established set of Security Laws.
The primary objective is to give the student a broad view of the wider threats and how they are perpetrated and linked together. Some technical aspects are not explicitly included, but they are reserved for other detailed sessions.
For the vast majority of history the progress of our species and civilisation was limited by a very few artisans - the workers of metal, wood, leather and cloth along with famers and distribution networks. Specifically, the number of skilled blacksmiths determined the rate of sword, knife, lance and armour production, and ultimately the size of empires.
The turning point came in the eaten 1700s when the Royal Navy was expanding to explore and colonies the planer. Nails were the problem with more than 20k required per ship! So this was the first item to be mad automatically, followed by wooden blocks for the rigging. The water mills constructed to power the production therefore mark the start of Industry 1.0 and the growth of the British Empire.
The spread of automation through Industry 2, 3 and 4 accelerated and empowered us to do more and more using less and less people, power and materials. Without it we could not support the population of the planet or the lifestyle we enjoy. Remarkably, at no time during this process have we seen mass unemployment, and consistently, more and more jobs have been created. In brief, better production capabilities have seen the creation of better tools, which in turn has led to better productivity and better quality.
The process has been evident in everything hardware, and much of entertainment ,design, and software, with services perhaps the last bastion of human based delivery and support. However; the on-line world and rise of AI are now changing the balance across retail, banking, insurance, accountancy, and services in general.
Industries 1.0, 2.0 (and most of) 3.0, saw manufacturing and construction using natural materials readily extracted, refined, amalgamated, machined, and molded. In general, these exhibited fixed mechanical, electrical, and chemical properties. However, the latter stages of Industry 3.0 embraced synthetics exhibiting superior properties to afford new degrees of freedom in the design of structures and products.
Today Industry 4.0 sees further advances with metamaterials, dynamic coatings, controllable properties, and additive manufacturing. Embedded smarts have also made communication between components, products and structures possible under the guise of the IoT. Adaptable materials with a degree of self-repair are also opening the door to further freedoms and less material use. In combination, these represent a big step toward sustainable societies with highly efficient ReUse, RePurposing, and Recycling (3R).
At the leading edge, we are now realising active surfaces that can reflect, absorb, or amplify wireless signals, offer programmable colour, and integral energy storage. But amongst a growing list of possibilities, it is integral sensing & communication that may define this new era. In this presentation, we look at these advances in the context of smart design, cities & societies.
For millennia we have crafted artifacts from bulk materials that we have progressively refined to produce ever more precision tools and products. Latterly, we have crossed a critical threshold where our abilities now eclipse Mother Nature. For example; the smallest transistors in production today have feature sizes down to 2nm which is smaller than a biological virus ~20 - 200nm. The implications for ITC, AI, Robotics, and Production are ever more profound as we approach, and most likely undercut, the scale of the atom ~ 0.1-0.4nm. Not only does this open the door to new technologies, it sees new and remarkable capabilities. So, in this presentation we look at this new Tech Horizon spanning robotics to quantum computing and sensory technologies, and how they will help us realise sustainable futures germane to Industry 4.0, 5.0, and beyond.
The ‘glue’ that binds life and the universe into a coherent matrix - there is far more to Bytes than just bits, communication, storage and perception!
Big Data, Small Data, Information; storage and transmission; immediately conjure a picture of ‘potential high confusion’. But Information Theory is here to help us despite it upsetting the ‘purists’ of other disciplines; for it ‘steals’ the ideas and concepts of fundamental physics to apply them in a new and novel way that some would consider ‘fuzzy and sloppy’.
“What passes as information theory today is not communication at all, but merely transportation. ... Information theory was developed by Claude E. Shannon to find fundamental limits on signal processing operations such as compressing data and on reliably storing and communicating data.”
Non-the-less, as a practical theory, it played a key role in empowering the telecoms, coding and computing revolutions by defining the limits of what is possible, what can and can’t be done. Without out this theory we would be engaged in blind engineering - trial and error, rules of thumb, and guessing!
The prime contention is the use of ‘Entropy’ as a practical measure of order and disorder outside the confines of Thermodynamics. Thankfully, Shannon assumed the edict: just because something is not pure, and perfect, doesn’t mean to say we can’t exploit it!
This tutorial therefore details the thinking and justifies the principles so that students may utilise the many facets in the design and practice of information system engineering. Specifically: digital transmission over copper, fibre and wireless, data storage in all media, image processing and display, signal coding, information encryption, and security.
Throughout our education and life we are mostly given a ‘soda-straw’ view of Maths, Physics, Chemistry, Biology, HealthCare, Business and Commerce that conditions us to ‘one concept at a time’ thinking. This is rife in Government and Politics, Industry and Health, and it has been extremely powerful in a now past slow paced and disconnected world. In fact, the speciation of disciplines, topics and problems has largely been responsible for the acceleration and prominence of human progress.
However; in a connected/networked, highly mobile, and tech driven world this simple and narrow minded view is insufficient and dangerous. In common parlance we refer to ‘unintended consequences’ whilst in complex system theory would use the term ‘emergent behaviours’. In brief; education, health, crime, productivity, GDP creation, social cohesion and stability cannot be considered independent variables/properties. They are all related and interdependent. For example; when politicians decide to starve the education system of funds for very young children the impact shows up in health, crime and the economy some 10 - 30 years later!
By analogy; all of this is true of our technologies, industries, lives, and the prospect of sustainable societies. Robots, AI, AL, and Quantum Computing do not stand alone in isolation, they have complementary roles. In this Public Lecture we devote an hour to thinking more holistically what these technologies bring to the party in the context of industry, health, society, sustainable societies and global warming. We then devote a further hour to discussion and debate.
In the context of Global Warming we make the following overriding observations:
“Panic is a poor substitute for thinking”
“Tech is the only exponential capability we enjoy”
“Technology is never a threat, but humans always are”
“Uncertainty always prescribes the precautionary principle”
We are living through an extraordinary pandemic (CV-19) that has changed all the network norms including the way we work and communicate. An invisible consequence has been the transformation of internet and telecoms traffic promoted by people working from home, restrictions on all travel and a paralysis of almost all social norms. Living and working in isolation for 3 - 5 months has become the new mode for many, and even the most technophobic have had to turned to video conferencing and on-line purchases to ‘survive’
From a network point of view the transition has seen the concentrations of traffic in major cities and towns mutate to the dispersed and disparate working, social and entertainment activities that have found the last mile wanting. Insufficient bandwidth connectivity and resilience have quickly become a prime concern with the overloading of core networks a lesser concern.
Installing new optical links and making the core (undersea and overland long-lines) networks more robust is relatively easy as they are by far the most resilient and secure of our infrastructures. It is the local loop, our last mile, that poses the hard to fix problem. In this session we present tested model solutions based on direct ‘dark-fibre’ to home and office with no electronics, splitters or access points in the field. This is augmented by Mesh-Nets and 4/5G providing temporary bridges for random fibre breaks and cable damage.
Education systems across the West have degenerated into a series of memory tests and the quest to hit abstract performance targets and measures. So students that appear well qualified are often unable to apply the most basic of mathematical, scientific, engineering or logical principles, and nor do they have a good appreciation of history or design. This does not bode well for a future of faster change and greater complexity.
“At the most basic level our society it is about the survival of the most adaptable”
For sure; today’s education and learning methodologies have to move toward more experimental and experiential working in order to reinforce the basics whilst engendering far greater understanding. Early specialism has also to be reversed with all students studying a broader range of topics through school and on into college and/or university.
“Education isn’t something you have to get done and dusted - it is a lifelong pursuit”
There is a further need to recognize that the (so-called) academic and practical streams are afforded equal importance! To get the best out of teams/groups all members have to share a common base of understanding and appreciation. In turn, this can be enabled and supported by Just-in-Time education and training-on-line. But there is much more….
Seventy years on from AI appearing on the public scene and all the optimistic projections have been largely overtaken with systems outgunning humans at all board, card and computer games including Chess, Poker and GO. Of course; general knowledge, medical diagnosis, genetics and proteomics, image and pattern recognition are now all firmly in the grasp of AI.
Interestingly, AI is treading a similar path to computing in that it began with single purpose/task machines that could only deal with a company payroll calculations or banking transactions and nothing more! General purpose computing emerged over further decades to give us the PCs and devices we now enjoy. So, AI currently runs as task specific applications on these general purpose platforms, and no doubt, general purpose AI will also become tractable in a few decades too!
Recent progress has promoted a deal of debate and discussion along with hundreds of published papers and definitions that attempt to characterise biological and artificial intelligence. But they all suffer the same futility and fail! Without reference to any formal characterisation, all discussion and debate remains relatively meaningless.
Somewhat ironically, it was the defence industry that triggered the analysis work here. Two of key steps to success were: the abandonment of all performance comparisons between biological and machine entities; and the avoidance of using the human brain as some ‘golden’ intelligence reference.
This presentation is suitable for professionals and public alike, and comes fully illustrated by high quality graphics, animations and movies. Inevitably, it contains (engineering) mathematics that non-practitioners will have to take on trust, whilst professionals may wish challenge on the basis that the focus on getting a solution rather than the purity of the process!
This presentation was delivered by the INDPETH Network (Nana Oye) to a workshop at the Liverpool School of Tropical Medicine on improving the use of research in policy and practice.
Workshop on getting to grips with digital strategy by thinking like a network. Understanding complex adaptive systems, terminology, exponential growth and how technology, behaviour and design all come together. Two exercises included are Stinky Fish and Jobs to be Done. Lots of stuff on Netflix in there too.
Only 40 years ago, the rate of technologically driven change was such that companies could re-organize efficiently and economically over considerable periods of time, but about 30 years ago this changed as the arrival of new technologies accelerated. We effectively moved from a world of slow periodic changes to one where change became a continuum. The leading-edge sectors were fast to recognize and adopt this new mode of continual adaptation driven by new technologies. This saw these ever more efficient and expansive companies dominating some sectors. For the majority, however, it seems that this transition was not recognized until relatively recently, and a so new movement was born under the banner of digitalization. This not only impacts the way people work, it affects company operations and changes markets, and it does so suddenly!.
Perhaps the most impactive and recent driver of change in this regard has been COVID which saw the adoption of video conferencing and working as a survival imperative in much less than a month. This now stands as a beacon of proof that companies, organizations, and society, can indeed change and adapt to the new at a rate previously considered impossible. The big danger for digitalization programmes now is the simple-minded view that there are singular (magic) solutions that fit every company and organization, but this is not the case. The reality is that the needs and culture of an organization are not the same and may not be uniform from top to bottom.
Manufacturing necessitates very steep hierarchical management structures and tight control to ensure the consistency of the quality of products. On the other hand, a research laboratory or design company requires a low flat management hierarchy and an apparently relaxed level of control. This is absolutely necessary to foster creativity, innovation, and invention. This presentation gives practical examples of management and organizational, extremes. We then go on to highlight the need to embrace AI and Quantum Computing over the coming decade to deal with future technologies, operating
and market complexity.
Informing Innovation: Contextual Investigation for Effective Academic Technol...char booth
Keynote presentation at the 2013 AMICAL Conference at John Cabot University in Rome, Italy.
Description: In this era of relentless change in higher education and information technology, it is essential to investigate local learning contexts to inform strategic programming and facilitate productive partnerships between libraries and academic institutions. From direct research into user needs and characteristics using environmental scanning, ethnography, and survey methodology to innovative tech-supported collaborations that inform library service models and pedagogy, this talk will explore established and emerging methods for developing an informed orientation to local communities of academic technology practice.
This is a presentation about the introduction to system and analysis design. The topic talks about what are the system development life cycle and how it works. It also talks about the professions or the team conducting a study.
Cisa domain 2 part 3 governance and management of itShivamSharma909
The process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives and what countermeasures to take in reducing risk to an acceptable level.
Affiliated Engineer
If you are looking for an internship in Engineering, at AIE Ireland we offer you the opportunity to apply in 6 countries in Europe and 2 in the United Kingdom for more information Contact us: e-mail: irelandtrainee@gmail.com / aieacademic.iep@gmail.com
https://www.aieireland.com/
Keynote - Jagdish Mitra - Democratizing AI - H2O AI World London 2018Sri Ambati
This talk was recorded in London on October 30th, 2018 and can be viewed here: https://youtu.be/zCOM46GuFVo
As Chief Strategy and Marketing Officer of Tech Mahindra Jagdish Mitra leads the global agenda of business growth driven by strategy, powered by Digital and manifested in brand experiences. He believes AI, automation, digital can enable us to create unique human experiences of the future and can help create a sustainable planet. Prior to this role he was the CEO of the start-up canvas M formed as a JV between TECHM and Motorola. He is a sports enthusiast, loves football and plays squash. He is founder of a Jishnu football foundation that trains and awards scholarships to high potential kids from challenged backgrounds.
Linkedin: https://www.linkedin.com/in/jagdish-mitra-b675772/
How to increase your online business | The Meekco Tree
Co-founder of Meekco.Asia talking about sales channel, Shopify Merchant Community Malaysia FB group & AsiaMart - the first ShopifyxLazada App.
Presentation to Ukraine Commodity Market Development Conference
The author of the presentation: Emma Weston, Chief Executive Officer, AgriDigital (Australia)
It should be no surprise that AI is treading a similar path to computing which began with single-purpose machines tasked for payroll calculations, banking transactions, or weapons targeting et al, but nothing more! It took decades for General Purpose Computing to emerge in the form of the now ubiquitous PC. Today, AI is still in a single-purpose/task-specific phase, and we have no general-purpose platforms, but their emergence is only a matter of time!
Recent AI progress has seen a repeat of the media debate and alarmist warnings for our computing past, compounded by consequential advances in robotics. In turn, this has promoted numerous attempts to draw biological equivalences defining the time when machines will overtake humans. But without any workable definitions or framework that tend to little more than un/educated guesses. Recourse to IQ measures and the Touring test have proved to be irrelevant, and without a reference framework or formal characterisation, continued discussion and debate remain futile
We therefore approach this AI problem from the bottom up by defining the simplest of machines and lifeforms to derive clues, pointers and basic boundary conditions . This sees a fundamental Entropic description emerge that is applicable to both machine and lifeforms.
This presentation is suitable for professionals and the public alike, and is fully illustrated by high-quality graphics, animations and, movies. Inevitably, it contains some mathematics that non-practitioners will have to take on trust, but the focus is on defining the key characteristics, parameters, and important features of AI, our total dependence, and the future!
Note: A 40 min session for a predominantly ley audience and not all the slides presented here were used on the day. Their inclusion here is in response to those audience members requesting more detail at the end of/during the event.
Past civilisations have nurtured small populations of those trying to understand and manipulate nature to some advantage in materials, tools, weapons, food, and wealth. However, they never formed communities and lacked the means of recording, communicating, and sharing successes and failures. They also lacked a common framework/philosophy to qualify them as scientists, but that all began to change in the 16th Century. In this lecture we consider the progression to a philosophy of science, and the underlying principles and assumptions that now guide scientific inquiry.We also examines the nature of scientific knowledge, the methods of acquisition, evolution, and significance over past centuries, and reflect on the value to society.
In the struggle to solve problems, deliver understanding, and reveal the truth about our universe, science had to suffer and survive: ignorance, bigotry, established superstitions, and the ‘diktats’ of religions and politics, and latterly, falling education standards mired by social media. We chart that ‘scientific’ journey emphasising the importance of observation, experimentation, and the search for universal laws. Ultimately, this essentially Aristotelian perspective was challenged and overtaken by the rise of empiricism, which emphasised the importance of sensory experience and the limitations of human knowledge.
Science continues to evolve and provide us with the best truths attainable with our leading edge technologies of observation and experimentation. Today, it stands as the greatest and richest contributor to human knowledge, understanding, progress, and wellbeing. In turn, debates and controversies are ongoing, shaping the field and philosophy which remains essential for understanding the nature of scientific knowledge and the models it creates. But unlike any belief system, the answers and models furnishers by science are not certain and invariant, they tend to be stochastic and incomplete - ‘the best we can do’ at a given time.
In this workshop session we identify aging technology design concepts, old business and operating models, plus energy supply limits as the prime constraints of 6G and beyond. We also identify the notion of an erroneous spectrum shortage born of the bands and channel mode of operation which is fundamentally unsuited to 6G and IoT demands in the near and far future.
We strongly link optical fibre in the local loop with future wireless systems and the need for very low-energy ‘tower-less’ systems. We also postulate a future demanding UWB and HWB (Hyper) with transmission energies ~𝛍W and signals below the ambient noise level. This will be necessary to power an IoT of >2.4Tn Things which we estimate to be necessary for Industry 4/5 and sustainable societies.
It is hard to understate the importance of ‘Thermodynamics’ in providing an almost complete (Grand Unified Theory) picture of the inner physics of energy transfer spanning machines and chemistry thro information.
Apparently, Einstein had two favourite theories: General Relativity and Thermodynamics! He championed both because of their ‘beauty’, completeness, and emergent properties purely derived from the fundamental consideration of how the universe works.
The origins of this topic mainly reside in the Industrial revolution and the realisation that the early machinery was grossly inefficient. E.G. Engines were only converting the energy consumed to ~2% of useful work output. This drew the attention of Savery (1698), Newcomen (1712), Carnot (1769), and for the next 200 years the conundrum of lost energy occupied many of the greatest scientific minds. This culminated in Rudolf Clausius (~1850)publishing his theory of Thermodynamics with further refinement by Boltzmann (1872).
Why was all this so important? In the 1700s a ‘beam engine’ weighing in at >20 tons consumed vast amounts of coal, to deliver an output ~10hp. Today a Turbofan jet Engine can deliver >30k hp at a weight of ~6 tons. This is the difference between working with little understanding, and today where our knowledge is far more complete. Our latest challenges tend around non-linear loss mechanisms associated with turbulent air and fuel flow.. And like many other fields we have to step beyond our generalise mathematical models and turn to the power of our computers for deeper insights.
Ultimately all machines, mechanisms, computing processes and information itself, involve the transformation of matter and/or bits, and thus they are Entropic and subject to the theory of Thermodynamics. This lecture therefore presents a foundation spanning the history and progress to date in preparation for the embracing other science and engineering disciplines.
Engineering might be defined as the judicial application of science and scientific knowledge, but with the rider that unlike science and scientific studies, engineering always has to deliver a solution and a result. There are therefore aspects of engineering that stretch and challenge, the accepted, wisdom and knowledge of science. To purists, this might appear outrageous, but it is no more so than the works of Erwin Schrödinger or Leonhard Euler et al
In this lecture we examine many of the established engineering basics whilst being mindful that most of our education, techniques, and working solutions are founded on the assumption of well behave linear environments. As our entire universe, and everything in it, is inherently complex and non-linear, we have to salute the powers of approximation and iteration for our many engineering success to date. However, we are increasingly being challenged by complexities of the fundamental non-linear nature of the problems confronting us. ( E.G. Politics, Conflict, Global Warming, Sustainability, Medicine, Fusion Power, Logistics, Networks, Depletion of Resources, Accelerating Tech Driven Change +++)
We start by tracing history from the foundations up to the present day, including modern analytical nomenclature and techniques, system reliability, resilience and costs, we highlight the the basic human limitations that necessitate multi-disciplinary teams that include AI and vast computing power.
The overall treatment includes our analogue past, digital today, and analogue/digital hybrid future of computing, robots, networks and systems of all kinds. It also includes animations, movies and sound files to demonstrate the realities of modern system design including the inherent complexities. To further highlight, and exemplify this projected future, we examine a real engineering project concerned with acoustic sniper spotting under battlefield conditions and extreme noise. Here a combination of digital modelling sees the use of analogue acoustic filter arrays, analogue signal amplification, and digital signal processing doubling the range of sniper detection and location.
IoT growth forecasts currently tend to span 30 – 60 Bn ‘Things’ by 2030. However, this ignores the central IoT role in realising sustainable societies where raw materials and component use have to see very high levels of reuse, repurposing, and recycling. In such a world almost everything we possess and use will have to be tagged and be electronically addressable as a part of the IoT. Such a need immediately sees growth estimates of 2Tn or more over the span of Industry 4 and 5. On the basis of energy demands alone, it is inconceivable that the technologies of BlueTooth, WiFi, 4, 5, and 6G could support such demand, and nor are the signaling and security protocols viable on such a scale.
The evolution of the IoT will therefore most likely see a new form of dynamic network requiring new lightweight protocols employing very little signal processing, together with very low energy wireless technologies (in the micro-Watt range) operating over extremely short distances (~10m). This need might be best satisfied by a new form of ‘Zero Infrastructure Mesh Networks’ that engage in active resource sharing, lossy probabilistic routing, and cyber security realised through an integrated ‘auto-immunity’ system. Ultimately, we might also envisage data amalgamation at key nodes that have a direct connection into the internet along with an additional layer of cyber checks and protection.
We justify the above assertions by illustrating the energy and network limitations of today’s 5G networks and those already obvious in current 6G proposals. We then go on to detail how a suitable IoT MeshNet might be configured and realised, along with a few solutions and emergent outcomes on the way.
Recently, it has become increasingly evident that we have engineers and scientists reaching a professional level of practice without a clear understanding of the scientific method, its origins, and its fundamental workings. There also appears to be a lack of appreciation of our total dependence on the truths that science continually reveals. How this situation ensued appears to vary from country to country, and the flavour of education system encountered by students. But a common complaint is the progressive dumbing down of the science curriculum along with a dire shortage of qualified teachers. This also seems to be compounded with the increasing speciation of science and engineering into narrower and narrower disciplines. So this situation (crisis?) prompted a request for a corrective series of foundation lectures focussed on healing these educational flaws across relevant disciplines, graduating and practicing levels. This then is the first in this foundation series.
Uncanny Valley addresses our reactions to humanoid objects, such as robots, a video game characters, or dolls, and how they look and act ‘almost’ like a real human. Feeling of uneasiness or disgust in the observer are addressed directly, rather than familiarity or attraction. The theory was proposed by Japanese roboticist Masahiro Mori in 1970 and has been explored by many researchers and artists since. It has application in AI, robotics, MMI, and human-computer interaction, and helps designers to create more appealing devices that can interact with people in various domains, such as industry, education, entertainment, defence, health care, et al.
In this lecture we explain and demonstrate the fundamentals before extending the principle to sound, motion, actions, and eyes as an output mechanism. We also note that all this poses some challenges and risks in the potential for reduced the emotional connections, empathy, acceptance, and trust between humans and machines. On a further dimension the potential to create threat and terror can be useful opportunity in the military domain. It is thus important to understand the causes and effects of the uncanny valley in the wider sense in order to meet the needs of each application space
The aspirational visions of Society 5.0 coined by many nations around 2015/16 have now been eclipsed by technological progress and world events including another European war, global warming, climate change and resource shortages. In this new context, the published 5.0 documents now seem naive and simplistic, high on aspiration, and very short on ‘the how’. The stark reality is that the present situation has been induced by our species and our inability to understand and cope with complexity.
“There are no simple solutions to complex problems”
What is now clear is that our route to survival and Society 5.0 will be born of Industry 4.0/5.0 and a symbiosis between Mother Nature, Machines, and Mankind. Today we consume and destroy near 50% more resources than the planet might reasonably support, and merely improving the efficiency of all our processes and what we do will only delay the end point. And so I4.0 is founded on new materials and new processes that are far less damaging, inherently sustainable, and most importantly, readily dispensable across the planet.
“Reversing global warming will not see a climatic reversal to some previously stable state”
In this presentation, we start with the nature of climate change, move on to the technology changes that might save the day, the impact of Industry 4.0/5.0, and then postulate what Society 5.0 might actually look like.
In a world of accelerating innovation and increasingly complex digital services, applications, appliances, and devices, it seems unreasonable to expect customers to understand and maintain their own cyber security. We are way past the point where even the well educated can cope with the compounded complexity of an ‘on-line-life’. The reality is, today's products and services are incomplete and sport wholly inadequate cyber defence applications.
Perhaps the single biggest problem is that defenders have never been professional attackers - and they don’t share the same level of thinking and deviousness, or indeed, the inventiveness of their enemies. Apart from an education embracing the attack techniques, and in some cases, engaging in war games, the defenders remain on the back foot However, there a number of new, an potentially significant, approaches yet to be addressed, and we care to look at the problem from a new direction.
In the maintenance of high-tech equipment and systems across many industries, identifiable precursors are employed to flag impending outages and failures. This realisation prompted a series of experiments to see if it was possible to presage pending cyber attacks. And indeed it was found to be the case!
In this presentation we give an overview of our early experimental and observational results, long with our current thinking spanning networks through to individual hackers, and inside actors.
When people are exposed to the new for the first time their reaction, quite rightly, is generally one of caution and perhaps a degree of suspicion. And, when that ‘new born’ is a novel technology, reactions can quickly become amplified and biased toward the dystopian by the sensationalism of media and mis-information of social networks. In this modern era I think we can also safely assume that Hollywood has more than a ‘bit part’ in nurturing extreme reactions with movies such as Terminator, AI and Ex-Machina.
Our purpose here is to dispel the modern myth that technology is, or can be, inherently evil and a direct threat to humanity. We do so by positing three basic axioms:
“Without technology we would know and understand
almost nothing”
“The greatest threat to humanity is humanity”
“If technology progress and societal advance stall, then civilisations collapse”
Having briefly establishing these in the context of our wider history, we focus on the Industrial Revolutions and their beneficial upside and consequential negatives. We then move on to examine Robotics, Artificial Intelligence, Artificial Life, and Quantum Computing in the context of our current needs and realising sustainable futures, and the survival of our civilisation.
Connecting Everything Vital to Sustainability
Mobile network evolution has followed a reasonably predictable path almost entirely focused on the needs of human communication. The transition from 1 to 2G was dictated by the economics of reliability, performance, and scale, whilst 3, 4, and 5G saw the transition to mobile computing with full internet access, AI and an ever-expanding plethora of applications. But 5G could be the end of the line as cell-site energy demands have become excessive at ~10kW.
Midway between the migration from 4G to 5G, M2M and the IoT machines overtook the human population of 8Bn people with near (estimated) 20Bn devices. Current IoT growth rates suggest a 40 - 60Bn population by 2030 to 2050. However, we present evidence that it could be far more ~ 1,000Bn ‘Things’. This is based on the observation of the number of IoT components populating modern vehicles, homes, offices, factories and plants, along with smart ‘human implants’ and ‘smart bolts’ plus the instrumentation of civil; structures.
The bold assumption that 5G would be a dominant player in the IoT is now patently one of naivety and the world has become far more complex with over 10 wireless standards currently in use. So, this poses the question; will 6G rise to the challenge? We see this as highly unlikely as the diversity of need is extremely broad, and we propose that it could be the end of tower based networks for a lot of applications. A migration to mesh-nets, UWB and (Hyper Wide Band) for the IoT at frequencies above 100GHz seems the most obvious engineering choice as it allows for far simpler designs with extremely low power at sub $0.01/device cost. 5G is already on the margins of being sustainable, and a ‘more-of-the-same’ thinking 6G can lonely be far worse!
In 2015/16 a number of bodies/nations set about defining societies they would aspire to in the near future. Each vision document similarly described some idealistic, egalitarian, super-smart, human centred, state providing a near uniformity of living conditions, and opportunity. At the same time, each society would be free of adversity, with economic development guided by ecological and human need. Of course, economic growth was defined to continue in line with the past. Very nice, but a product of old linear thinking and modelling!
It is now approaching 2022 and in the past 5/7 years our base silicon technology has advanced to enjoy a >30 fold increase in computing power. Our top end mobile devices would now challenge a super computer of 1996/7 era, whist AI systems now pervade our homes, offices, vehicles, professions and all our on-line services. At the same time, information overload has started to rival some medical conditions!
All of this has also been compounded by two years of COVID-19 lockdowns and restrictions that have seen the normalisation of social isolation, limited travel, working and eduction from home, virtualised medicine and care, support services, shopping and meetings. In turn, this has resulted in empty offices, towns and cities. Concurently, climate change, global warming, pollution, finite resources, a stressed planetary system, and social unrest have suddenly become urgent issues. Against this backdrop it really seems to be time to revisit those Society 5.0 Visions and the limited linear thinking that contrived them!
In this presentation we examine many of the core parameters and assumptions to highlight existing, or soon to be realised, solutions and remedies. In doing so, a different picture of Society 5.0 emerges.
The biggest force for social change since the first industrial revolution has been adjusting to, and taking advantage of, the new and accelerating capabilities of our advancing technologies. And in our entire history, the dominant technology driver has been silicon-based electronics. It has prompted revolutions in Computing, Telecoms, Automation, AI, and Robotics that radically changed the human condition. Today, that same exponential revolution is accelerating us into Industry 4.0 and onto Industry 5.0.
The consequential transformation of medicine, industrial design and production, farming, food, processing, supply and demand has seen living standards improve and life expectancy widen. Many of our institutions have also seen tech-driven transformations in line with industry. If there has been a down-side to this progression, it has been our inability to transform the workforce ahead of new demands. Unemployment has persisted whilst reeducation and retraining have been on the back foot, whilst, the net creation of new jobs has always exceeded the demise of the old. As a result, leading countries in the first world now have labour shortages at all levels right across the spectrum.
Recently, COVID-19 has demonstrated that we have the technology and we can rapidly reorganise and change society if we have to. So in this presentation, we examine ‘the force functions’ and changes engineered to date, and then peer over the horizon to sample what is to come in terms of technologies and working practices…
Throughout my career in science, engineering and management I attended numerous meeting where many misconceptions and misinterpretations were evident. Perhaps the most expansive and expensive were the probabilities assumed and calculated for system reliability and/or product manufacturing quality. Eventually, I began to refer to this as ‘five nines’ problem!
Not fully understanding the origins of the reliability measures, it is so easy to demand a 99.999% instead of 99.99% up time for an electronic system. What could be easier? At face value it appears to be trivial and straightforward! Likewise, taking a 5s manufacturing plant up to a 6s defect level turns out to be a monumental engineering challenge! And at the time of writing 6s has never been achieved!
It appears that to few engineering and management courses address this topic, and if they do, it is as a scant reference of insufficient depth. So, we see far too many students understand in any depth, if at all! And when they become managers they just ‘don’t get it’!
This presentation and the associated lecture have been specifically created to address this problem with relevance to BSc, BA, MSc and MBA students along with anyone needing a refresher or explicit introduction to the topic. In addition to the graphics, animations and movies, the lecture is also littered with practical examples and the outcomes of case studies.
It was scientifically established in the 1970s that we are stressing the planet beyond the point where it can naturally recover. Today we are using about 50% more natural resources than can be extracted sustainably. The long history of industrialisation and population growth is now seeing climate change, extreme weather, and perhaps it is human overpopulation and terraforming that is now giving way to pandemics as we increasingly challenge and stress ecosystems.
Stressed systems react and fail in a variety of ways, and there is increasing evidence that CV-19 might just be the surprising product of human abuse of nature. What we can be certain of is that without action we will see more unpleasant and unwelcome surprises.
The Green Agenda is our biggest hope, but much of it is driven by emotion rather than deep thought, evidence, and scientific analysis. For example; recycling is mostly a fallacy and we need to think again! In reality Industry 4.0 is the first major program vested in the basics of long term sustainability.
In this presentation we give a brief overview of what I4.0 brings to the party by a focus on one major sector that is ripe for transformation. A much broader and wider treatment has been presented at previous events and numerous additional, associative, and supportive slide sets in this series are available on the web site.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
CYBER DEFENCE SCENARIOS - Part 2: Building The Blue Team
1. CYBER
D E F E N C E
SCENARIOS
p e t e r c o c h r a n e . c o m
Prof Pet er Coch rane OBE
2. STUDENT ALERT
This Lecture is a primarily a BLUE TEAM exercise
where we review the field to then assume the mantle
of a defence group engineering a secure environment
for fixed and mobile workers
Be prepared to exploit the attacker mind-set thinking the
unthinkable during the previous RED TEAM exercise!
The process will become highly interactive toward the
latter half of the lecture and to fully understand you will
have to fully engage
3. N O S i l v e r B u l l e t s
C o m p l e x p r o b l e m s d e m a n d c o m p l e x s o l u t i o n s
- Yo u c a n n o t s o l v e a p r o b l e m f r o m w i t h i n t h e v e r y
f r a m e w o r k t h a t c r e a t e d i t !
- T h e e n e r g y t o s o l v e a p r o b l e m i s a l w a y s g r e a t e r
t h a n t h a t e x p e n d e d t o c r e a t e i t !
We a r e g o i n g t o n e e d a w i d e
r a n g e o f c o n t i n u a l l y e v o l v i n g
& i n c r e a s i n g l y s o p h i s t i c a t e d
t o o l s i f w e a r e t o s t o p / c o n t r o l
t h e g r o w t h o f c y b e r a t t a c k s …
- T h e m o r e w e k n o w a b o u t t h e E n e m y / D a r k S i d e /
R e d Te a m t h e m o r e l i k e l y w e a r e t o s u c c e e d !
4. T o b e e f f e c t i v e !
C o m p r e h e n s i v e d e f e n c e d e s i g n +
G l o b a l
M o b i l e
M a l l e a b l e
A d a p t a b l e
A u t o m a t e d
C o n c e n t r i c
R e s p o n s i v e
I n t e l l i g e n t
E v o l u t i o n a r y
S e l f s u f f i c i e n t
W e l l m a i n t a i n e d
H i g h l y n e t w o r k e d
W h o l l y i n t e g r a t e d
F u l l y a n t i c i p a t o r y
I S P . n
D e c o y s
A p p s . n
F i b r e . n
C l o u d . n
R o u t e . n
D e c o y s
C l o a k i n g
B i o m e t r i c s
C l o a k i n g
S e r v i c e s x n
A I A n a l y s i s
D a t a S h a r i n g
anticipato
C o l l a b o r a t o r s
M a r k e t W a t c h
A I D i a g n o s t i c s
2 4 x 7 x 3 6 5 W a t c h
W h i t e H a t Te s t i n g
D e v i c e M o n i t o r i n g
P e o p l e M o n i t o r i n g
T r a f f i c M o n i t o r i n g
A t t a c k M o n i t o r i n g
N e t w o r k M o n i t o r i n g
B e h a v i o u r a l A n a l y s i s
S e c u r i t y A d v i s o r y B o a r d
E x p e r i e n c e / D a t a N e t w o r k
5. P a s t L e s s o n s
F e n c e
F e n c e + M o u n d
W a l l + M o u n d
W a l l + M o u n d + D i t c h
W a l l + M o u n d + M o a t
W a l l ( s ) + M o u n d + K e e p + M o a t
+ + +
+ + +
W a l l ( s ) + M o u n d + K e e p + M o a t
+ H i d d e n D i t c h + O b s t a c l e s
+ + +
+ + +
C a s t l e i n a C a s t l e !
6. S lo w e vo l u t i o n
T h e e n e m y i s m o b i l e & a g i l e
I r o n A g e
N a p o l e o n
E x p o n e n t i a l l y m o r e e x p e n s i v e a n d l o n g e r b u i l d t i m e
E f f e c t i v e n e s s o n a s h o r t e r a n d s h o r t e r f u s e !
7. S lo w e vo l u t i o n
T h e e n e m y i s m o b i l e & a g i l e
I r o n A g e
N a p o l e o n
E x p o n e n t i a l l y m o r e e x p e n s i v e a n d l o n g e r b u i l d t i m e
E f f e c t i v e n e s s o n a s h o r t e r a n d s h o r t e r f u s e !
Does this not look
like
the recent history
of
cyber
defence w
ith
layer
on
layer
of
fixed/static
defences
And
w
e are still
building
them
in
the
form
of bunkers at
even
vaster
expense
8. WA L L S D O N ’ T W O R K
B u t w e k e e p b u i l d i n g t h e m !
And after > 2000 years
of evolution, what
comes next?
9. WA L L S D O N ’ T W O R K
B u t w e k e e p b u i l d i n g t h e m !
And after > 2000 years
of evolution, what
comes next?
After
1000s of years
building
them
they
are
still static
and
unable to
adapt as
fast as the enemyYou can
dig
a
tunnel
cut a
hole
end
run
climb over
fly
over
drive/w
alk
through
on
false documents
10. Fa s t e r e vo l u t i o n
T h e e n e m y i s m o b i l e a n d a g i l e
11. W H At D I D W E L E A R N !
C o n c e n t r i c d e f e n c e l a y e r s w o r k ( i s h ) ?
N o t s o i f t h e y a r e :
F i x e d
U n c h a n g i n g
U n r e s p o n s i v e
S l o w t o e v o l v e
L a c k i n t e l l i g e n c e
P o o r l y m a i n t a i n e d
O p e r a t e i n i s o l a t i o n
N o t w h o l l y i n t e g r a t e d
N o t f u l l y a n t i c i p a t o r y
H u b
L A N
S w i t c h
C P E
H u b
L A N
S w i t c h
C P E
I S P
C L O U D ( s )
S e c u r i t y a t
e v e r y l a y e r
h a s t o b e
d y n a m i c &
a d a p t a b l e
V
P
N
s
-P
N
s
E
n c r y p
t i o n
12. E X E M P L A R
T h r e a t R e d u c t i o n
“ H o n e d i n t h e f a c e o f y e a r s
(decades) of ongoing of threat
with Carriers, Companies, ISPs
Service Providers, Security and
I n t e l l i g e n c e a g e n c i e s a c ro s s t o
provide a stable (for now) model
- but much more is required of the
IT industry, Operators & Customers”
13. E X E M P L A R
T h r e a t R e d u c t i o n
“ H o n e d i n t h e f a c e o f y e a r s
(decades) of ongoing of threat
with Carriers, Companies, ISPs
Service Providers, Security and
I n t e l l i g e n c e a g e n c i e s a c ro s s t o
provide a stable (for now) model
- but much more is required of the
IT industry, Operators & Customers”
Each
segment/ish
demands specialised
teams and
great
expertise on
r
and
d
FULL TIME
14. P a r o d y !
W e f e e l r e a l i t y
S u p p o s e o u r c a r s w e r e
l i k e o u r l a p t o p s a n d
o t h e r I T k i t - w h a t
w o u l d w e t h i n k
a n d d o ?
T h i s i s a c o m p l e t e
p r o d u c t b a s e d o n t h e
i n d u s t r i a l d e v e l o p m e n t s s p a n n i n g > 1 3 0 y e a r s
15. R E A L I T Y !
I t c a n b e a p a i n
A u t o U p g r a d e
P r o b l e m a t i c
N o t f u l l s o !
E a c h d e v i c e i s
i d i o s y n c r a t i c & n o t
i n h e r e n t l y s e c u r e -
d e m a n d i n g u s e r s t o
b e a l e r t & c a p a b l e !
M u l t i - O S
M u l t i - A p p
F i x e d / M o b i l e
Users lives at work and
at home are becoming
ever more complex as
the number of devices,
peripherals, terminals
and appliances multiply
Husband - Wife
H o m e - O f f i c e
F i x e d - M o b i l e
P e r s o n a l a n d
Company
Children
School-Home
Games -Video
S o c i a l N e t s
S t u d y - F u n
16. R E A L I T Y !
I t c a n b e a p a i n
A u t o U p g r a d e
P r o b l e m a t i c
N o t f u l l s o !
E a c h d e v i c e i s
i d i o s y n c r a t i c & n o t
i n h e r e n t l y s e c u r e -
d e m a n d i n g u s e r s t o
b e a l e r t & c a p a b l e !
M u l t i - O S
M u l t i - A p p
F i x e d / M o b i l e
Users lives at work and
at home are becoming
ever more complex as
the number of devices,
peripherals, terminals
and appliances multiply
Husband - Wife
H o m e - O f f i c e
F i x e d - M o b i l e
P e r s o n a l a n d
Company
Children
School-Home
Games -Video
S o c i a l N e t s
S t u d y - F u n
All of these products
have only
been
w
ith
us
a
very
few
decades
and
remain
immature
17. T h e i m m a t u r e I o T
A N D N E X T ?
T h e i n f a n t i l e I o T
Conceived, designed, produced
off shore with security more
or less an afterthought
& a last minute kluge!
This may be an impending nightmare
21. IncreasingRisk S tat u s
U n t e n a b l e
IT Companies need
to get a grip anD
start supplying
complete products
IT security is way
beyond Joe Public
and most of the
poPulation
22. S o l u t i o n S p a c e
B e h a v i o u r a l A n a l y s i s o f P e o p l e ,
M a c h i n e s , N e t w o r k s , A p p l i c a t i o n s
23.
24.
25. S o l u t i o n S p a c e
A I B e h a v i o u r a l A n a l y s i s o f N e t
M a c h i n e s , N e t w o r k s , A p p l i c a t i o n s
Pre-Attack
Activities
26. S o l u t i o n S p a c e
A I B e h a v i o u r a l A n a l y s i s o f N e t
M a c h i n e s , N e t w o r k s , A p p l i c a t i o n s
Pre-Attack
Activities
Early
days but
retrospectively
show
n
to
be capable of
identifying
some cyber
and
terrorist attacks
AI Still in
early
learning
phase and
examining
many
different attack
types
Grossly
underfunded
in
a
start up w
ith
actual deployment
uncertain
27. S e g u e
D i v e r s i t y
Power + Control + Comms Cable Distribution
Port
Keel
Starboard
Power Generation + Main Plant + Generator + Batteries
I n c r e a s i n g r e l i a b i l i t y ,
re s i l i e n c e & s u r v i v a b i l i t y
28. S e g u e
D i v e r s i t y
Power + Control + Comms Cable Distribution
Port
Keel
Starboard
Power Generation + Main Plant + Generator + Batteries
I n c r e a s i n g r e l i a b i l i t y ,
re s i l i e n c e & s u r v i v a b i l i t y
S a f e t y
B e l t ,
B r a c e s
L i f e l i n e
29. D i v e r s i t y
F a c e B o o k S e r v e r F a r m
F a c i l i t y M i r r o r e d i n a n d o u t
M u l t i p l e P o w e r & F i b r e F e e d s
C o n t r o l l e d A c c e s s a t a l l l e v e l s
S
ta
n
d
b
y
G
e
n
e
ra
to
rs
&
B
a
tte
rie
s
~ 5 0 k m
f r o m
n e a r e s t A i r p o r t
Standby
B
atteries
fo
r
every
rack
30. D i s p e r s e d
R i s k & R e d u n d a n c y
P e o p l e S k i l l s
P h y s i c a l L o c a t i o n s
M u l t i p l e E q u i p m e n t s
T r a f f i c R o u t i n g D i r e c t i n g
31. D i v e r s i t y
R e l i a b i l i t y / R e s i l i e n c e
32. D i v e r s i t y
R e l i a b i l i t y / R e s i l i e n c e
A single Cloud/Services Provider poses a
potential single point of failure
All your eggs in one basket with no legal recourse
should the provider lose or corrupt your data
33. D i v e r s i t y
R e l i a b i l i t y / R e s i l i e n c e
34. D i v e r s i t y
R e l i a b i l i t y / R e s i l i e n c e
Triplication creates a vast improvement in
the overall reliability and security
35. S e c u r e S t o r a g e
D o c u m e n t s o p e n , l o c k e d , e n c r y p t e d ?
Singular back ups, or multiple co-
located Tape, Disc, SS drives on
desk, in building, on servers, at ISPs,
or on a singular Cloud?
Could we create
an even greater
degree of data
security
36. S e c u r e S t o r a g e
D o c u m e n t s o p e n , l o c k e d , e n c r y p t e d ?
Singular back ups, or multiple co-
located Tape, Disc, SS drives on
desk, in building, on servers, at ISPs,
or on a singular Cloud?
Multiple Clouds (at least)
triplicated provides a far
higher degree of security
Why an odd number (3) ?
If you only had two copies -
and one is corrupted how do
you choose the correct one?
Could we create
an even greater
degree of data
security
37. S e g u e
A e r o S p a c e
C o m m o n l y a d o p t t r i p l i c a t e d s e n s o r s , c o m p u t e r s ,
d i s p l a y s + e l e c t r i c a l a n d h y d r a u l i c s y s t e m s + + +
38. O t h e r s e c t o r s
M o s t m i s s i o n / l i f e c r i t i c a l s y s t e m s !
N u c l e a r P o w e r
i s o b v i o u s - c a n
y o u t h i n k o f m o r e
l i k e l y c a n d i d a t e s ?
39. b l o c k C h a i n
A v e r y b r i e f o v e r v i e w
F o r a f u l l e r t r e a t m e n t
G O T O : h t t p s : / / w w w . s l i d e s h a r e . n e t /
P e t e r C o c h r a n e / b l o c k - c h a i n - b a s i c s
S h o r t F o r m : h t t p s : / / b i t . l y / 2 x s x E J t
40. B l o c k C h a i n
A v e r y v e r y b r i e f o v e r v i e w
•Self organising
•Functionally autonomous
•A distributed electronic ledger
•2007/2009 saw visible manifestations
•No one knows the inventor/origins for sure
•Designs, protocols and code are open source
•Security agencies suspected to be on a similar tack
•Specialised Block Chains dedicated to just one task
•Generalised Block Chains are now becoming a platform
•A next step in the logical progression toward decentralisation
•Inherently more secure than any previously realised transaction system
•Sidelines institutions and centralised control making all transactions simpler
41. C a p a b i l i t i e s
Great utility spanning all spheres
Voting
Storage
Records
R&D data
Multi-media
Production data
Patents/Copyright
Licences/permissions
Property deeds/ownership
Every form of value exchange
Ultra secure communications
All forms of legal documentation
+++++
WTH are Hash Functions
and Merkel Trees?
42. C a p a b i l i t i e s
Great utility spanning all spheres
Voting
Storage
Records
R&D data
Multi-media
Production data
Patents/Copyright
Licences/permissions
Property deeds/ownership
Every form of value exchange
Ultra secure communications
All forms of legal documentation
+++++
WTH are Hash Functions
and Merkel Trees?
Confirms the validity
of data and an agreed
transaction beyond
all doubt
IF you did not study
maths you have to
take this on trust
but there is hidden
beauty in all this
there has been a
widespread hype of
this tech and what it
can actually do
It has been used
inappropriately and
many have disclosed
their architectures
43. A N e w L e d g e R
Digital, Encrypted, Highly Complex
• Distributed attack virtually impossible
• Obscuration through complexity
• Impervious to focussed attack
• Spread over many machines
• Geographically distributed
• Address space invisible
• Inherently secure
• Format variable
• Vastly scaleable
• Multiple forms
• Multi-key
No one knows who owns individual machines,
where they are, what type they are, which OS
and apps they use, when & if they are on-line
(No) single point of
failure or access
Machines can protect
themselves and
each other
Networks are generally
configuration dynamic
A vast number
of app, config,
coding, hash, and
design options
Keeping
the design
detail a secret
is imperative
Concatenated
hash checks
have never
been cracked
Operates
securely without
all members
being
on-line
44. A S A N E T W O R K
Dynamically connected machines
via every conceivable topology
Thisdiversityalladdstothesecurityequation
Open
Closed
Internet
Telephone
Broadband
L AN
WiFi
WL AN
3/45G
DarkNet
45. A S A N E T W O R K
Dynamically connected machines
via every conceivable topology
Thisdiversityalladdstothesecurityequation
Open
Closed
Internet
Telephone
Broadband
L AN
WiFi
WL AN
3/45G
DarkNet
How do I know you are
what you say you are
where is the validation
and evidence of any
crosschecks
PUBLIC KEY ETAL ARE in
use here but it is a
prime threat area and
a point of attack
46. S E C U R I T Y
C o m m u n i c a t i o n s
All machine-to-machine/network
communications are protected
by public and/or private key or
some other form of ‘disguising/
hiding/encryption’
If you need a tutorial on this GOTO:
https://www.slideshare.net/PeterCochrane/public-key-made-very-easy
https://bit.ly/2yp1tep
Short Form GOTO:
47. b l o c k c h a i n
Perhaps the ultimate solution
Ledger(s)
Processing
Storage
A decentralised system of shared ledgers
(public or private) across tens/hundreds/
thousands of machines of all
kinds capable of processing,
storage and peer-to-peer
networking
48. b l o c k c h a i n
Perhaps the ultimate solution
Ledger(s)
Processing
Storage
A decentralised system of shared ledgers
(public or private) across tens/hundreds/
thousands of machines of all
kinds capable of processing,
storage and peer-to-peer
networking
obviously
in
the limit
not infinitely
scalABle
connectivity
Latency
machine memory
et Al
are all finite
49. S a m p l e F E AT U R E S
B y wa y o f s i m p l e b u t s t ro n g a n a l o g i e s
• A transaction (a single page) has a hash number (page character type count)
• Blocks (concatenated pages) have an accumulated page-on-page, hash-on-hash value
• BlockChain - an endless book (of concatenated chapters) has an accumulated running hash
We an detect the removal
or insertion of a single full
stop, or any character, word,
sentence, para or page
anywhere in this Bible!
We therefore know with
certainty if it has been
Interfered with!
50. boiled down
U s i n g p r o v e n a l g o r i t h m s
PROOF OF WORK
Was a message sent ?
Was a transaction completed ?
Was everything acknowledged ?
How big was the completing hash ?
Was everything checked and tested positive ?
HASH FUNCTION
An apparently simple mathematical operation
Uses a complex seed of two (or more) primary numbers
This is digitally multiplied by a binary file to be protected
A unique hash is generated to detect the smallest of changes
Answers the question: is this the correct file or has it been tampered with ?
Hash Binary
Code Number
Unique Hash
Code Number
Input
File
Input
Factors
Proof of
Work
Number
51. M E r k L e T R EE
T h e c o n c a t e n a t e d h a s h
Each page of a our book is
given a hash value used in
creating a block hash and then
a chain hash by a process of
sequential concatenation
PAGE 1 PAGE 2 PAGE 3 PAGE 4
HASH OF
PAGE 1 + 2
HASH OF
PAGE 3 + 4
HASH OF PAGES
1 + 2 + 3 + 4
A change of any one
character or space
on any page at any
time will be detected
& flagged immediately
HIGH SECURITY
52. File
1
File
2
File
4
File
3
#
# #
## # #
A four file Block
Individual file hashing
Grouped hash of hashes
A full block hash
A fixed size number that will
change if just one file has
a ‘full stop’ changed
N The Block hash value
53. P r o c e s s W a l k T h r o u g h
For only one simple set of choices
User 1 requests a transaction
54. P r o c e s s W a l k T h r o u g h
For only one simple set of choices
User 1 requests a transaction
Peer computers analyse past
blockchain transactions with
verification through proof of
work and/or P2P consensus
55. A different peer group for
User 2 ?
P r o c e s s W a l k T h r o u g h
For only one simple set of choices
User 1 requests a transaction
IFF all are agree that this is a
sound transaction, then & only
then:Assets are exchanged
Peer computers analyse past
blockchain transactions with
verification through proof of
work and/or P2P consensus
56. A different peer group for
User 2 ?
P r o c e s s W a l k T h r o u g h
For only one simple set of choices
The entire transaction is
recorded in the distributed
ledger across many machines
User 1 requests a transaction
IFF all are agree that this is a
sound transaction, then & only
then:Assets are exchanged
Peer computers analyse past
blockchain transactions with
verification through proof of
work and/or P2P consensus
57. A different peer group for
User 2 ?
P r o c e s s W a l k T h r o u g h
For only one simple set of choices
The entire transaction is
recorded in the distributed
ledger across many machines
User 1 requests a transaction
IFF all are agree that this is a
sound transaction, then & only
then:Assets are exchanged
Peer computers analyse past
blockchain transactions with
verification through proof of
work and/or P2P consensus User 2 receives materials
58. M i n i n g
Many alternatives
Negating all the
5 1 % , i n t r u d e r, &
m i m i c a t t a c k
scenario(s)
Randomly select 3, 5, 7…users as decision arbiters
Send them the ‘work functions’ of all users (or a significant
slice/sample thereof )
If the select 3, 5, 7… all agree that all user work functions
and final hash tally; the transaction is carried
This is also a simple way of isolating
r o g u e u s e r s a n d c o m p r o m i s e d
machines/portions of the network
59. m o r e
G O T O W W W
Beyond this outline
you will find many
articles, movies and
slide sets dealing with
specific cases and
i m p l e m e n t a t i o n s
available on line
T h e d e p i c t i o n
opposite is just one
example of very many
60. P a r s i n g
C l a s s i c P e r s p e c t i v e
Used extensively in speech recognition
and language translation by machines
61. P a r s i n g
C l a s s i c P e r s p e c t i v e
Used extensively in speech recognition
and language translation by machines
W
e
n
eed
to
ben
d
th
is
c
o
n
c
ept
to
a
d
v
a
n
ta
g
e
in
th
e
c
r
ea
tio
n
o
f
super
sec
ur
e
sto
r
a
g
e
o
n
c
lo
ud
o
r
o
ff
62. P a r s i n g
O u r P e r s p e c t i v e
We a r e a b o u t t o u s e t h i s t o ‘c h u n k ’
documents pre or post encrypt BUT pre
dispersion to multiple clouds or storage
locations
Parse by Para
Encrypt with same/
or different keys
63. P a r s i n g
O u r P e r s p e c t i v e
We a r e a b o u t t o u s e t h i s t o ‘c h u n k ’
documents pre or post encrypt BUT pre
dispersion to multiple clouds or storage
locations
Parse by Para
Encrypt with same/
or different keys
64. P a r s i n g
O u r P e r s p e c t i v e
We a r e a b o u t t o u s e t h i s t o ‘c h u n k ’
documents pre or post encrypt BUT pre
dispersion to multiple clouds or storage
locations
Parse by Para
Encrypt with same/
or different keys
65. P a r s i n g
O u r P e r s p e c t i v e
We a r e a b o u t t o u s e t h i s t o ‘c h u n k ’
documents pre or post encrypt BUT pre
dispersion to multiple clouds or storage
locations
Parse by Para
Encrypt with same/
or different keys
D e p o s i t o n
the same disc
or cloud…or
D e p o s i t o n
multiple discs
or clouds…
66. P a r s i n g
O u r P e r s p e c t i v e
We a r e a b o u t t o u s e t h i s t o ‘c h u n k ’
documents pre or post encrypt BUT pre
dispersion to multiple clouds or storage
locations
Parse by Para
Encrypt with same/
or different keys
D e p o s i t o n
the same disc
or cloud…or
D e p o s i t o n
multiple discs
or clouds…
A
ll
a
d
d
r
essin
g
a
n
d
d
o
c
um
en
t
ID
a
n
d
fo
r
m
a
t
in
fo
sh
o
uld
be
g
r
o
ssly
d
iffer
en
t
a
n
d
g
iv
e
n
o
c
lues…
C
o
m
pleten
ess
m
ust
be
a
c
o
n
d
itio
n
o
f
th
is
pr
o
c
ess
to
en
sur
e
m
a
x
im
um
sec
ur
ity
n
o
pa
r
tia
l
c
lues
67. P a r s i n g
O u r P e r s p e c t i v e
Can be by letter word, line, group sampling,
and by document geographical (variable/fixed)
guillotining
68. P a r s i n g
O u r P e r s p e c t i v e
Can be by letter word, line, group sampling,
and by document geographical (variable/fixed)
guillotining
D e p o s i t o n
the same disc
or cloud…or
69. P a r s i n g
O u r P e r s p e c t i v e
Can be by letter word, line, group sampling,
and by document geographical (variable/fixed)
guillotining
D e p o s i t o n
the same disc
or cloud…or
D e p o s i t o n
multiple discs
or clouds…
70. P a r s i n g
O u r P e r s p e c t i v e
Can be by letter word, line, group sampling,
and by document geographical (variable/fixed)
guillotining
D e p o s i t o n
the same disc
or cloud…or
D e p o s i t o n
multiple discs
or clouds…
W
e
c
a
n
ta
k
e
th
is
m
uc
h
fur
th
er
but
so
fa
r
it
is
th
e
m
o
st
sec
ur
e
pr
o
to
c
o
l
fo
r
c
lo
ud
a
n
d
d
isc
sto
r
a
g
e
71. Back to ThePeriphery
R e a l i t y C h e c k a s o f 2 0 2 0
Attacks escalating
Our exposure is growing
Attackers are winning the war
Attackers get richer by the year
Our defences are not 100% effective
We need to collaborate and share all
We are largely disorganised and underinvesting
People remain our single biggest attack risk
All our security tools are reactive & mostly outdated
Best market model appears to be the airline industry
72. Back to ThePeriphery
R e a l i t y C h e c k a s o f 2 0 2 0
Attacks escalating
Our exposure is growing
Attackers are winning the war
Attackers get richer by the year
Our defences are not 100% effective
We need to collaborate and share all
We are largely disorganised and underinvesting
People remain our single biggest attack risk
All our security tools are reactive & mostly outdated
Best market model appears to be the airline industry
We Can present easy
and very attractive
Opportunities for
cyber hackers and/or
criminals
73. Collaboration
A i r l i n e s m o d e l 2 0 2 0
Safety record is all
Embraces entire industry
Every accident is investigated
All incident reports are open & shared
Safety communication is pilot/operator centric
Industries, manufacturers, governments all committed
Well organised and structured with a high level of accountability
Passenger and crew safety is the single biggest concern and success metric
74. Collaboration
A i r l i n e s m o d e l 2 0 2 0
Safety record is all
Embraces entire industry
Every accident is investigated
All incident reports are open & shared
Safety communication is pilot/operator centric
Industries, manufacturers, governments all committed
Well organised and structured with a high level of accountability
Passenger and crew safety is the single biggest concern and success metric
75. Collaboration
A i r l i n e s m o d e l 2 0 2 0
Safety record is all
Embraces entire industry
Every accident is investigated
All incident reports are open & shared
Safety communication is pilot/operator centric
Industries, manufacturers, governments all committed
Well organised and structured with a high level of accountability
Passenger and crew safety is the single biggest concern and success metric
Flying is generally
the safest mode
transport globally
as a result of this
Reinforcing model
Cyber security is in
need of something
very similar if it is
ever to migrate out
of The victim mode
76. • No transgressions
• Work up to the limit
• Keep within the spirit & word
• Our responsibility to keep up to date
• Seek legal advice on latitude
• Special dispensations may be possible
• National security/intelligence may help
• In general the Buck ends with you !
P L E A S E N O T E
A t t a c k e r s s u f f e r n o n e o f t h i s
Legal system
Codes of practice
Ethical principles
Moral responsibilities
The Dark Side is wholly
u n c o n s t r a i n e d a n d
limited by nothing and
no one - they only care
about the RoI - and the
damage, hurt, they inflict
- the crimes, and moral
outrages they commit -
mean nothing to them!
This sets us apart from
these despicable people
and it is the single biggest
differentiator in our
thinking, actions and mode
of operation!
77. EU GDPR https://eugdpr.org/
•Lawfulness, fairness and transparency.
•Purpose limitation.
•Data minimisation.
•Accuracy.
•Storage limitation.
•Integrity and confidentiality (security)
•Accountability.
Global Laws https://www.privacypolicies.com/blog/global-privacy-laws-explained/
• COPPA, CalOPPA
• Do Not Track
• PIPEDA, HIPPA
F a s t E v o l v i n g
Mostly on the back foot often unworkable!
78. EU GDPR https://eugdpr.org/
•Lawfulness, fairness and transparency.
•Purpose limitation.
•Data minimisation.
•Accuracy.
•Storage limitation.
•Integrity and confidentiality (security)
•Accountability.
Global Laws https://www.privacypolicies.com/blog/global-privacy-laws-explained/
• COPPA, CalOPPA
• Do Not Track
• PIPEDA, HIPPA
F a s t E v o l v i n g
Mostly on the back foot often unworkable!
UK
Data
Protection
act often
violated
by
Gov
Depts and
their
employees
and
public
mostly
ignore it
79. OUR COAT OF ARMS
W e h a v e c o d e s o f p r a c t i c e !
Do No Harm
As Cyber Security Professionals we are the tip
of a defence sword; but we cannot wield it as
yet! There has to be a national/international
decision as we are looking at starting a war that
might just expand into a global conflagration!
Reality is that no nation/country is in a position
to sanction such a risk (independent action) as
all are suffering inadequate defences and could
suffer a societal collapse should a war ensue!
80. OFF THE TABLE FOR NOW
W e m u s t n o t a n d d a r e n o t r e t a l i a t e !
We almost certainly have all the tools, and technologies to ‘burn’ all the
hackers, hacker groups, criminals, rogue states, military and government
agencies! However, MAD prevails!
Mutually Assured Destruction
We are in a new kind of
cold-war but the other
side are making a fortune!
The extent of National Security retaliation ‘appears’ to be the taking down
of offending sites…
81. - r t s a t = o m n o w
ust n o t a n d d a r e n o t r e t a l i a t e !
We almost certainly have all the tools, andtechnologies to 'burn' all the
hackers,hacker groups, criminals, rogue states, military and government
agencies!However, MAD prevails!
IJutually ssured estruction
We are in a new kind of
cold-war but the othe
sidearemakinga fortune!
Theextent of National Security retaliation 'appears' to be the taking down
of offending sites...
83. SO HERE WE ARE !
I n t h e m i d d l e o f a m a j o r w a r
84. The eNemy Innovates fast
T h i n g s l i k e t h i s p o p u p a l m o s t w e e k l y !
85. D e f e n c e e s s e n c e
S p e e d o f d e t e c t i o n , r e s p o n s e & a d a p t a t i o n
1) Our own passivity is the biggest danger
2) The attacker agility and innovation our biggest challenge
3) Attackers have the first mover advantage & get to choose everything
4) Human defenders cannot be vigilant and prepared 24 x 365 year-on-year
5) Situational awareness is key & rooted in Data/Information gathering/analysis
6) Machines, AI, Machine Learning are key to solving (4 & 5) and giving us the edge
7) The application of anticipatory techniques is still in its infancy and needs investment!
8) Disparate companies, groups and government almost all the components we need
9) It is essential that these resources (8) are brought to bear and integrated with (5 -7)
8) We might just win this war, but not without changing the way we think and operate!
86. https://www.varonis.com/blog/cybersecurity-statistics/
A t t a c k C a t a l o g u e
W e f a c e a r a p i d l y c h a n g i n g l a n d s c a p e !
“ I t i s e s s e n t i a l t o m a k e a c y b e r t h r e a t r e v i e w a d a i l y r o u t i n e
b y c o n t i n u a l l y t a p p i n g t h e r i c h v e i n o f r e p o r t s a n d h e a d l i n e
n e w s a v a i l a b l e t o t h e d e f e n c e c o m m u n i t y ”
https://go.crowdstrike.com/crowdstrike-global-threat-report-2020.html
https://www6.gemalto.com/ppc/dtr/global
https://www.accenture.com/gb-en/insights/cyber-security-index
https://solutionsreview.com/endpoint-security/key-findings-the-check-
point-2020-cyber-security-report/
87. E X P E R T O V E R V I E W
C h e c k P o i n t 2 0 2 0 C y b e r S e c u r i t y R e p o r t
Major Takeaways :
“2019 presented a complex threat landscape where nation states, cybercrime
organisations and private contractors accelerated the cyber arms race, elevating
each other’s capabilities at an alarming pace, and this will continue into 2020”
“Even if an organisation is equipped with the most comprehensive, state-of-the-art
security products, the risk of being breached cannot be completely eliminated”
“Beyond detection and remediation, organisations need to adopt a proactive plan to
stay ahead of cyber-criminals and prevent attacks. Detecting and automatically
blocking the attack at an early stage can prevent damage”
89. f a c t o i d s
J u s t s c e n e s e t t i n g 1
Global cybersecurity spend to reach $133.7 Bn in 2022. (Gartner)
62% of businesses hit by phishing/social engineering attacks in 2018. (Cybint Solutions)
68% of business leaders see cybersecurity risks increasing. (Accenture)
Only 5% of companies’ folders are properly protected, on average. (Varonis)
Data breaches exposed 4.1 Bn records in the first half of 2019. (RiskBased)
71% of breaches financially motivated and 25% motivated by espionage. (Verizon)
52% of breaches were hacking, 28% malware, 32–33% phishing social eng. (Verizon)
Between Jan 2005 & April 2018 there were 8,854 recorded breaches. (ID Theft Resource Center)
Overall ransomware down 52% but enterprise infections up by 12% in 2018. (Symantec)
Top malicious email attachment types: doc & .dot = 37%, next is .exe = 19.5%. (Symantec)
By 2020 humans & machines passwords globally will be ~300 billion. (Cybersecurity Media)
90. f a c t o i d s
J u s t s c e n e s e t t i n g 2
Security breaches have increased by 11% since 2018 and 67% since 2014. (Accenture)
Hackers attack every 39 seconds, on average 2,244 times a day. (University of Maryland)
The average time to identify a breach in 2019 was 206 days. (IBM)
The average lifecycle of a breach was 314 days (from the breach to containment). (IBM)
500M customers (2014 on) information compromised @ Marriott-Starwood made public 2018.
64% of Americans have never checked to see if they were affected by a data breach. (Varonis)
56% of Americans don’t know what steps to take in the event of a data breach. (Varonis)
The average cost of a data breach is $3.92 million as of 2019. (Security Intelligence)
83% of enterprise workloads will move to the cloud by the year 2020. (Forbes)
In 2016 3 BnYahoo accounts hacked in one of the biggest breaches of all time. (NY Times)
91. f a c t o i d s
J u s t s c e n e s e t t i n g 3
In 2016, Uber reported hackers stolen info on >57 million riders and drivers. (Uber)
In 2017, 412 M user accounts were stolen from Friendfinder’s sites. (Wall Street Journal)
In 2017, 147.9 M consumers were affected by the Equifax Breach. (Equifax)
The Equifax breach cost the company over $4 billion in total. (Time Magazine)
In 2018, Under Armor reported “My Fitness Pal” was hacked, affecting 150 M users.
Uber tried to pay off hackers to delete the stolen data of 57 million users and
keep the breach quiet. (Bloomberg)
18 Russians, 19 Chinese individuals, 11 Iranians and one North Korean were
involved in indictments for their alleged state-sponsored espionage against the
United States. (Symantec)
93. P e r s i s t e n t C r i s i s
Anti-phase cyclic actions correlate with events
Company/Institutions/Gov/Industry
Status Surveys remain almost static year-
on-year and show little sign of improvement
despite the growing number of attacks &
reputational damage
94. At ta c k R a n k i n g s
W h e r e t o f o c u s a n d t o t r a c k !
95. I n i t i a l A c c e s s
D o m i n a n t b r e a k - i n m e t h o d s
A l l h u m a n f a l l i b i l i t y
m e c h a n i s m s !
96. S P A M H O S T I N G
T o p 2 0 C o u n t r y H i t P a r a d e
97. S P O O F E D B R A N D S
T o p 1 0 u s e d i n S P A M A t t a c k s
98. M a l w a r e C O D E
N e w g e n e t i c c o d e i n c r e a s e
99. M a l w a r e C O D E
N e w g e n e t i c c o d e i n c r e a s e
TopIndustryTargets
SPAM
Victims
100. M a l w a r e C O D E
N e w g e n e t i c c o d e i n c r e a s e
TopIndustryTargets
SPAM
Victims
Bew
are
1
w
hat this does not
show
is the potential/
actual roi per
category
Bew
are
2
Nor
does it indicate
the probability
or
likelihood
of a
hit
per
category
101. P r e d i c t i o n s 2 0 2 0
W h e r e a r e t h e c y b e r t h r e a t s t o b e ?
102. C I S C O P O S I T I O N
Protecting customers - taking the pain away
https://www.youtube.com/watch?time_continue=130&v=eg_m5jrt1gQ&feature=emb_logo
103. B a c k t o o u r R e a l i t y
W e a r e i n a m a j o r w a r a n d l o s i n g f a s t
The long term solution rests on 6 (or 7) cornerstones:
1) Taking human DIY out of the security loop
2) Automate the cyber security on every app, device, machine++
3) Apply the principles of auto-immunity throughout the user domain
4) Change the culture from destructive protectionism to proactive sharing
5) Engage in R&D that allows us to ape and anticipate the Dark Side Attacks
6) Introduce AI learning engines at every level to identify ‘give away’ patterns
7) ?????
104. E t h i c a l
H a c k e R
H i r e a ‘ w h i t e h a t ’ a t t a c k e r s
f i n d h i d d e n v u l n e r a b i l i t i e s
105. F u r t h e r R e a d i n g
A selection of relevant reports & studies
https://resources.infosecinstitute.com/top-cybersecurity-predictions-for-2020/#gref
https://www.ifsecglobal.com/cyber-security/predicting-the-top-five-2020-cyber-security-trends/
https://cybersecurityventures.com/cybersecurity-almanac-2019/
https://www.mimecast.com/the-state-of-email-security-2019/
https://www.cisco.com/c/en_uk/products/security/security-reports.html
https://www.forbes.com/sites/daveywinder/2020/02/11/these-ancient-microsoft-security-flaws-
are-still-driving-cybercrime-in-2020/#3c3105a6657e
https://www.akamai.com/uk/en/resources/our-thinking/state-of-the-internet-report/global-state-
of-the-internet-security-ddos-attack-reports.jsp
https://www.ibm.com/security/digital-assets/xforce-threat-intelligence-index-map/#/
https://content.fireeye.com/m-trends/rpt-m-trends-2020
106. Things that Think want to Link
and
Things that Link want to Think
F I N - Q & A ?
www.petercochrane.com