Cyber Hegelianism
Capt Wardrobe Dec 2020 - June 2021
Problem; The hacking of infrastructure
National defense compromised?
Malicious Domain in SolarWinds Hack Turned into 'Killswitch'
A key malicious domain name used to control potentially thousands of computer systems compromised via the months-long breach at network monitoring software vendor SolarWinds was commandeered by security experts and used as a "killswitch" designed to turn the sprawling cybercrime operation against itself, KrebsOnSecurity has learned.
Austin, Texas-based SolarWinds disclosed this week that a compromise of its software update servers earlier this year may have resulted in malicious code being pushed to nearly 18,000 customers of its Orion platform. Many U.S. federal agencies and Fortune 500 firms use(d) Orion to monitor the health of their IT networks.
On Dec. 13, cyber incident response firm FireEye published a detailed writeup on the malware infrastructure used in the SolarWinds compromise, presenting evidence that the Orion software was first compromised back in March 2020. FireEye said hacked networks were seen communicating with a malicious domain name - avsvmcloud[.]com - one of several domains the attackers had set up to control affected systems.
As first reported here on Tuesday, there were signs over the past few days that control over the domain had been transferred to Microsoft. Asked about the changeover, Microsoft referred questions to FireEye and to GoDaddy, the current domain name registrar for the malicious site.
Today, FireEye responded that the domain seizure was part of a collaborative effort to prevent networks that may have been affected by the compromised SolarWinds software update from communicating with the attackers. What's more, the company said the domain was reconfigured to act as a "killswitch" that would prevent the malware from continuing to operate in some circumstances.
"SUNBURST is the malware that was distributed through SolarWinds software," FireEye said in a statement shared with KrebsOnSecurity. "As part of FireEye's analysis of SUNBURST, we identified a killswitch that would prevent SUNBURST from continuing to operate."
The statement continues:
"Depending on the IP address returned when the malware resolves avsvmcloud[.]com, under certain conditions, the malware would terminate itself and prevent further execution. FireEye collaborated with GoDaddy and Microsoft to deactivate SUNBURST infections."
"This killswitch will affect new and previous SUNBURST infections by disabling SUNBURST deployments that are still beaconing to avsvmcloud[.]com. However, in the intrusions FireEye has seen, this actor moved quickly to establish additional persistent mechanisms to access to victim networks beyond the SUNBURST backdoor.
This killswitch will not remove the actor from victim networks where they have established other backdoors. However, it will make it more difficult to for the actor to leverage the previously distributed versions of SUNBURST."
It is likely that given their visibility into and control over the malicious domain, Microsoft, FireEye, GoDaddy and others now have a decent idea which companies may still be struggling with SUNBURST infections.
The killswitch revelations came as security researchers said they'd made progress in decoding SUNBURST's obfuscated communications methods. Chinese cybersecurity firm RedDrip Team published their findings on Github, saying its decoder tool had identified nearly a hundred suspected victims of the SolarWinds/Orion breach, including universities, governments and high tech companies.
Meanwhile, the potential legal fallout for SolarWinds in the wake of this breach continues to worsen. The Washington Post reported Tuesday that top investors in SolarWinds sold millions of dollars in stock in the days before the intrusion was revealed. SolarWinds's stock price has fallen more than 20 percent in the past few days. The Post cited former enforcement officials at the U.S. Securities and Exchange Commission (SEC) saying the sales were likely to prompt an insider trading investigation.
Mike Pompeo; Russia responsible for the attack
December 20, 2020 -
MOSCOW (Reuters) - Russian President Vladimir Putin said the foreign intelligence service was exceptionally important for protecting the country, in comments made soon after it was accused by some of being behind a major hack on U.S. government departments.
Speaking at an event commemorating 100 years since the founding of the SVR foreign intelligence service, Putin said the agency and other security services were a crucial guarantee of Russia's "sovereign, democratic, independent development."
Some international cyber researchers have suggested that Russia's SVR foreign intelligence service may have been behind an unprecedented attack on U.S. government computer systems first reported by Reuters last week.
U.S. Secretary of State Mike Pompeo said on Friday that Russia was responsible for the attack. The Kremlin has always denied Moscow's involvement in cyber attacks against the West. It has said that Russia had nothing to do with this latest assault.
Putin told attendees of the event, which also marked the Day of the Security Services Worker, that it was important to continue developing the work of counterintelligence agencies.
"I know what I'm talking about here," Putin, a former KGB agent, said, in comments shared on the Kremlin website. "And I rate very highly the difficult professional operations that have been conducted."
"The most serious attention must be paid to information security, to the fight against extremism and against corruption," he added.
He also told members of the agency to pay particular attention to risks posed by conflicts "simmering" near the country's borders.
Clashes have again been reported between Armenia and Azerbaijan over the Nagorno-Karabakh enclave despite a Russian-brokered ceasefire. Weekly anti-government protests continue in Belarus.
"I expect that the Foreign Intelligence Service will continue to respond flexibly to the highly changeable international context, actively participating in identifying and neutralising potential threats to Russia, and improving the quality of its analytical materials," Putin said.
The Biden administration is moving to treat ransomware attacks as a national security threat, using intelligence agencies to spy on foreign criminals and contemplating offensive cyber operations against hackers inside Russia, U.S. officials and other sources familiar with the matter tell NBC News.
Though using the military to take action against criminals would not be without precedent, it's controversial in legal circles, and any American cyber action against targets in Russia would risk retaliation. But officials say criminal ransomware attacks from abroad, once a nuisance, have become a major source of economic damage, as the disruption of gasoline and meat supplies in recent weeks has illustrated.
"Right now, they are hair on fire," one former government official said of the Biden administration.
In an example of the new approach, the White House was unusually quick to point the finger at Russia for harboring the attackers, just one day after officials learned of the ransomware strike on meat processor JBS. In previous incidents, it took weeks or months for the U.S. government to publicly blame another country as the source of a cyber attack.
But momentum was building even before Biden took office. As the onslaught of ransomware attacks against hospitals and local governments increased, the National Security Agency in the summer of 2019 began spying on certain foreign criminal hacker groups, according to a former official and three other sources familiar with the matter. Officials say that intelligence collection puts the U.S. in a better position to target the groups if the president orders a strike.
Because they are not carried out directly by governments, ransomware attacks like the ones that hit Colonial Pipeline and JBS have for years been treated as purely criminal matters, investigated by the FBI with an eye toward prosecution. Criminal accountability was rare, though, because most of the hackers reside in Russia and other places outside the reach of American law enforcement. Russia allows the hackers to operate without interference as long as they are attacking the West, U.S. officials say.
Even as the NSA began assembling data on ransomware groups, hospital systems were hit last fall by another wave of attacks. Sources say U.S. officials in charge of cyber policy became further convinced that it was time to get more intelligence resources — and military cyber warriors — focused on the problem.
"Sometime at the end of last year, everyone decided that this had risen to the level of a threat to national security," said James Lewis, a cyber expert at the Center for Strategic and International Studies who consults frequently with government officials.
Spokespersons for the NSA and U.S. Cyber Command declined to comment.
"While we won't comment on specific planned or ongoing operations, we provide options through the Department of Defense to the president," the cyber command spokesperson said.
Since Biden took office, the impact of ransomware attacks has grown, officials say. An attack on Colonial Pipeline last month led to gasoline shortages, and a strike against meat processing firm JBS threatened a quarter of America's meat processing capacity. Had JBS not gotten back online quickly —presumably by paying a ransom — experts say Americans might have experienced significant meat shortages.
On Thursday, Anne Neuberger, Deputy National Security Advisor for Cyber and Emerging Technology, issued an open letter to corporate leaders urging them to improve their cyber defenses.
"The number and size of ransomware incidents have increased significantly," she said. "The U.S. government is working with countries around the world to hold ransomware actors and the countries who harbor them accountable, but we cannot fight the threat posed by ransomware alone. The private sector has a distinct and key responsibility."
Neuberger also said the U.S. government was seeking to "disrupt" ransomware networks, though she didn't say how.
In a typical ransomware attack, hackers break into a corporate network and lock up data, demanding payment in order to release it. Some also threaten to post business secrets on the internet if payment is not made.
Cyber security experts say successful ransomware attacks often take advantage of companies with substandard cyber defenses.
But even if every company and local government had the best defensive technology in place, hackers with enough time and money would find a way to get through, experts say. That's why the Biden administration is contemplating ways to deter ransomware gangs and the countries that give them sanctuary, principally Russia.
The White House says Biden will put Russian President Vladimir Putin on notice at the June 16 summit between the two leaders that Russia must stop harboring criminal hackers. But Lewis and other experts do not anticipate Putin caving to U.S. demands.
If he doesn't, Biden will have a menu of options in front of him, current and former officials say, including offensive action by U.S. Cyber Command, the military hackers based at Fort Meade who wield cyber weapons that can take down networks and turn computers into bricks.
The military would be careful to operate in a gray area, just short of the international law definition of an act of war, said Gary Brown, a former Pentagon cyber warrior who now serves as professor of cyber law at the National Defense University. That's exactly what Russia has been doing to the U.S. over the last decade, he said, with a campaign of disinformation, election interference and hacking.
Among the things Cyber Command could do, he said, is disrupt the hackers' ability to access their own networks and tools, "infect their networks with modified tools that have our own little special gifts attached to them," and harass some of the key players.
Indictments by the Justice Department also serve a purpose, he said, by blocking the hackers from most travel and access to the U.S. financial system.
The U.S. could also impose further economic sanctions on Russia, but "we've kind of pressed the sanctions button pretty close to the max," Brown said. "In my opinion, we seem to have kind of run the course on how much you can do with that."
Whatever the U.S. response has been, it hasn't led Russia to stop harboring the criminal hackers, said Glenn Gerstell, who retired in 2020 after five years as NSA general counsel.
"We're not going to shut off all the lights in Moscow," he said, but "whatever it is we're doing now is clearly not producing the desired effect. We need to do something different."
Some scholars have urged caution in the use of the military against criminal hackers. Jason Healy, a former White House official who is now a cyber expert at Columbia University, made that argument in an article for the Lawfare blog last month, saying the military should only be used against criminal groups as a last resort, in response to an imminent threat.
Military force has been used against criminals before, in raids to free American hostages, such as when Navy SEALs rescued merchant ship crew members from Somali pirates in 2009, an incident later portrayed in the Tom Hanks movie, "Captain Phillips."
And in August 2020, current and former officials say, U.S. Cyber Command took down a Trickbot, a botnet used to deploy ransomware. That was the first known use of military force against criminal hackers, and it was justified as a measure to prevent election interference, because Trickbot also could have been repurposed to disrupt the 2020 elections.
Cyber command's mission is to defend the United States in cyberspace, Gerstell said.
"If the country is experiencing malicious effects from a cyber attack, that to me creates a justification for U.S. Cyber Com to be more aggressive," he said.
Posted on June 9, 2021 - Tyler S. Farley
The FBI was looking to send a big message yesterday to would-be criminals when they announced they had recovered the Bitcoin ransom paid to the supposed hacking group which shut down the Colonial Pipeline with a ransomware attack last month.
But less than 24 hours later, their message seems to be getting a little cloudy and instead is drawing scrutiny as to what actually happened.
At first, the FBI reported the news of them recovering the Bitcoin as some act of sophisticated digital forensics that was an example of the far reach of the FBI. However, it turns out the Bitcoin was sitting comfortably and easily accessible on a custodial account in northern California.
Yes, California. Despite the mainstream news once again parroting "muh Russia" as soon as the ransomware attack went public, it turns out the ransom was sent to an exchange or other type of custodial Bitcoin address in California.
What's even more puzzling than the location is the fact that the so-called sophisticated hacking group didn't even realize that Bitcoin held in a custodial type exchange is not really owned by them. This fact is well known to even amateur Bitcoin users and investors who almost always use personal wallets they control, not custodial accounts on exchanges to hold their Bitcoins. Yet somehow, these hackers which were able to bring down entire critical infrastructures were unaware of that fact.
Once the FBI learned where the Bitcoin was being stored using basic publicly available tools, they simply applied for a court order to seize it, which they did with a simple phone call.
So as of now, the "conclusion" of this story seems to really be just the beginning of realizing the whole thing is not what it was reported to be in the first place.
From the beginning we were told the hack was done by a foreign group with very sophisticated techniques and methods. Yet now we see they were total amateurs who couldn't even properly store the Bitcoin ransom they asked for. By the way, personal Bitcoin wallets are free to download and use by anyone. So if the hackers simply downloaded a free wallet, they would still have their millions of dollars. It all just doesn't make sense.
What's worse is the FBI is clearly hoping the public is too stupid to realize their story is completely bogus. But considering tens of millions of people own and invest in Bitcoin, I doubt that will be the case.
Right about now some people would argue that criminals are often stupid and do stupid things, but that applies to strong-arm criminals who rob liqueur stores and steal purses. Hackers are a totally different breed of criminals and are usually some of the most intelligent people in the world, especially within their realm of computers. Bitcoin storage should fall right into their wheelhouse of expertise, yet the FBI is now essentially telling us these hackers had no idea what they were doing.
So as I mentioned earlier, it seems like this story is just starting instead of being wrapped up. The narrative of a sophisticated hacking group being responsible is now falling apart and no new explanation has been offered. Many people with knowledge of hacking and Bitcoin are starting to wonder if this was some sort of false flag because they can't believe any hacker would be so stupid as to not store their Bitcoin in a personal wallet.
Like the content distribution network world, cloud computing—when computing services are entrusted to a remote provider—is dominated by just a few major players led by Amazon Web Services, Google and Microsoft. Amazon, the biggest cloud provider, periodically has brief outages, which are a big deal for customers.
"And if it became a major outage of, say, more than six, eight hours—but days—it could put companies out of business," said Josh Cheesman, an analyst with the tech market researcher Gartner Inc.
The question is: What could cause such a serious outage that might destroy customer data? A major cyberattack is one possibility. Another is fire or catastrophic natural disaster. These businesses, after all, are based in datacenters. In March, a fire at a datacenter in Strasbourg, France, owned by a major cloud computing firm knocked out service to millions of websites.
[my italics]
SHOULD THE GOVERNMENT REGULATE THESE FIRMS? WHAT CAN COMPANIES AND INDIVIDUALS DO TO PROTECT THEMSELVES?
The Empire fights back!
Solution: ownership of all digital realms...
enabling criminalizing decentralized Blockchain / Crypto...
and enabling measures such as introducing CBDC
Crypto adopted as currency in El salvador
The bottom line: El Salvador's move does nothing to reassure observers who worry that bitcoin's prime real-world use case is crime.
After El Salvador, India may move to classify Bitcoin as an asset class
Do you want to live in a world where every purchase you make and every interaction you have with others is recorded, documented and unchangeable?
What about a world where everyone is manipulated into rating each other in some kind of evil social rating system on a daily basis?
Your every move is recorded and every website you visit is documented. Every book you read, every time you step off the curb before the light changes, and every time you go even one unit above the speed limit it is used against you. If your score drops, you lose access to travel and quality food, and if it drops enough you eventually lose your home and become untouchable with no hope of ever getting ahead in life.
According to a report from state-run media, "Remin Chain," from Hangzhou's Hyperchain Technology, will be integrated into the People's Daily Online Public Opinion Monitoring Center—the government apparatchik responsible for monitoring and analyzing every comment made online by China's 800 million netizens. As the name implies, the center is run by People's Daily, one of the mouthpieces of the Communist Party.
follow the money/control of data
The news of Peter Thiel as an investor in Block.One was reiterated with the announcement of Bullish, the upcoming crypto Exchange developed by Block.One and integrated with EOS. Indeed, Peter Thiel was among the investors who led the capital raise for Bullish for about $300 million. In addition Peter Thiel, along with Alan Howard, Richard Li, and Christian Angermayer will serve as senior advisors to the company.
As a result, Thiel's engagement with Block.one is encouraging. This is especially relevant as Palantir went public and PLTR stock was quickly snatched up by traders, making it another large profit for Thiel. Given Palantir's experience in big data, crypto appears to be an obvious next step. - Source
Elon Musk's SpaceX announced Thursday that Google would team up with its Starlink satellite internet service to deliver cloud computing services to business customers.
Under the partnership, SpaceX will place its Starlink ground stations within Google data center properties, which can help the service support businesses requiring cloud-based applications.
Starlink is in the process of launching its satellite broadband internet service, which can reach customers without ground-based connections and is one of several space-based systems.
"Combining Starlink's high-speed, low-latency broadband with Google's infrastructure and capabilities provides global organizations with the secure and fast connection that modern organizations expect," said SpaceX president and chief operating officer Gwynne Shotwell.
"We are proud to work with Google to deliver this access to businesses, public sector organizations, and many other groups operating around the world."
Urs Hoelzle, senior vice president at Google Cloud, said the tie-up would help ensure "that organizations with distributed footprints have seamless, secure, and fast access to the critical applications and services they need to keep their teams up and running."
This new capability for enterprise customers is expected to be available in the second half of 2021, the companies said in a joint statement.
SpaceX is seeking regulatory approval for broadband service for both consumers and businesses around the world from thousands of satellites.
How did the FBI recover the ransomeware money? how did they infiltrate the operations of "The Darksides" Crypto Blockchain activity - some interesting revelations here
Did the FBI just recover the Colonial Pipeline ransom money from itself? The narrative of a sophisticated hacking group seems to be falling apart.
ARE OTHER PARTS OF THE INTERNET SIMILARLY VULNERABLE?
via Top down space based
unhackable Quantum based cyber systems
...and a social credit system...
Globally
|
Quantum Computation
Rather than store information using bits represented by 0s or 1s as conventional digital computers do, quantum computers use quantum bits, or qubits, to encode information as 0s, 1s, or both at the same time. This superposition of states—along with the other quantum mechanical phenomena of entanglement and tunneling—enables quantum computers to manipulate enormous combinations of states at once.
How D-Wave Systems Work
D-Wave systems use a process called quantum annealing to search for solutions to a problem.
In nature, physical systems tend to evolve toward their lowest energy state: objects slide down hills, hot things cool down, and so on. This behavior also applies to quantum systems. To imagine this, think of a traveler looking for the best solution by finding the lowest valley in the energy landscape that represents the problem.
Classical algorithms seek the lowest valley by placing the traveler at some point in the landscape and allowing that traveler to move based on local variations. While it is generally most efficient to move downhill and avoid climbing hills that are too high, such classical algorithms are prone to leading the traveler into nearby valleys that may not be the global minimum. Numerous trials are typically required, with many travelers beginning their journeys from different points.
In contrast, quantum annealing begins with the traveler simultaneously occupying many coordinates thanks to the quantum phenomenon of superposition. The probability of being at any given coordinate smoothly evolves as annealing progresses, with the probability increasing around the coordinates of deep valleys. Quantum tunneling allows the traveller to pass through hills—rather than be forced to climb them—reducing the chance of becoming trapped in valleys that are not the global minimum. Quantum entanglement further improves the outcome by allowing the traveler to discover correlations between the coordinates that lead to deep valleys.
|
Programming a D-Wave System
To program the system, a user maps a problem into a search for the "lowest point in a vast landscape," corresponding to the best possible outcome. The quantum processing unit considers all the possibilities simultaneously to determine the lowest energy required to form those relationships. The solutions are values that correspond to the optimal configurations of qubits found, or the lowest points in the energy landscape. These values are returned to the user program over the network.
Because a quantum computer is probabilistic rather than deterministic, the computer returns many very good answers in a short amount of time—thousands of samples in one second. This provides not only the best solution found but also other very good alternatives from which to choose.
Application development is facilitated by D-Wave's open-source Ocean software development kit (SDK), available on GitHub and in Leap, which has built-in templates for algorithms, as well as the ability to develop new code with the familiar programming language Python.
D Wave Systems
|
Geordie Rose founder of D-Wave Quantum Computers mocks the Mandela Effect as "a funny, gigantic conspiracy" and also discusses advancements in Artificial Intelligence. The last part deals with a quick analysis of the various theories of whats causing the Mandela Effect, and which of them sound plausible. |
Senior author, Professor Alessandro Fedrizzi, who led the team at Heriot-Watt, said: "We've long known that quantum entanglement, which Albert Einstein called 'spooky action at a distance' can be used for distributing secure keys. Our work is the first example where this was achieved via 'spooky action' between multiple users at the same time -- something that a future quantum internet will be able to exploit."
Secure communications rely upon the sharing of cryptographic keys. The keys used in most systems are relatively short and can therefore be compromised by hackers, and the key distribution procedure is under increasing threat from quickly advancing quantum computers. These growing threats to data security require new, secure methods of key distribution.
[snip]
The technology demonstrated here has potential to drastically reduce the resource costs for conference calls in quantum networks when compared to standard two-party QKD methods. It is one of the first examples of the expected benefits of a future quantum internet, which is expected to supply entanglement to a system of globally distributed nodes.
Quantum holds the key to secure conference calls - Eureka Alert
|
|
Cyber Security solution;
The Global Quantum Internet
Researchers create an
Toshiba's research team has broken a new record for optical fiber-based quantum communications, thanks to a new technology called dual band stabilization.
By Daphne Leprince-Ringuet | June 10, 2021
Researchers from Toshiba have successfully sent quantum information over 600-kilometer-long optical fibers, creating a new distance record and paving the way for large-scale quantum networks that could be used to exchange information securely between cities and even countries.
Working from the company's R&D lab in Cambridge in the UK, the scientists demonstrated that they could transmit quantum bits (or qubits) over hundreds of kilometers of optical fiber without scrambling the fragile quantum data encoded in the particles, thanks to a new technology that stabilizes the environmental fluctuations occurring in the fiber.
This could go a long way in helping to create a next-generation quantum internet that scientists hope will one day span global distances.
The quantum internet, which will take the shape of a global network of quantum devices connected by long-distance quantum communication links, is expected to enable use-cases that are impossible with today's web applications. They range from generating virtually un-hackable communications, to creating clusters of inter-connected quantum devices that together could surpass the compute power of classical devices.
Quantum Computing
But in order to communicate, quantum devices need to send and receive qubits – tiny particles that exist in a special, but extremely fragile, quantum state. Finding the best way to transmit qubits without having them fall from their quantum state has got scientists around the world scratching their heads for many years.
One approach consists of shooting qubits down optical fibers that connect quantum devices. The method has been successful but is limited in scale: small changes in the environment, such as temperature fluctuations, cause the fibers to expand and contract, and risk messing with the qubits.
This is why experiments with optical fiber, until now, have typically been limited to a range of hundreds of kilometers; in other words, nowhere near enough to create the large-scale, global quantum internet dreamed up by scientists.
To tackle the instable conditions inside optical fibers, Toshiba's researchers developed a new technique called "dual band stabilization". The method sends two signals down the optical fiber at different wavelengths. The first wavelength is used to cancel out rapidly varying fluctuations, while the second wavelength, which is at the same wavelength as the qubits, is used for finer adjustments of the phase.
Put simply, the two wavelengths combine to cancel environmental fluctuations inside the fiber in real time, which according to Toshiba's researchers, enabled qubits to travel safely over 600 kilometers.
Already, the company's team has used the technology to trial one of the most well-known applications of quantum networks: quantum-based encryption.
Known as Quantum Key Distribution (QKD), the protocol leverages quantum networks to create security keys that are impossible to hack, meaning that users can securely exchange confidential information, like bank statements or health records, over an untrusted communication channel such as the internet.
During a communication, QKD works by having one of the two parties encrypt a piece of data by encoding the cryptography key onto qubits and sending those qubits over to the other person thanks to a quantum network. Because of the laws of quantum mechanics, however, it is impossible for a spy to intercept the qubits without leaving a sign of eavesdropping that can be seen by the users – who, in turn, can take steps to protect the information.
Unlike classical cryptography, therefore, QKD does not rely on the mathematical complexity of solving security keys, but rather leverages the laws of physics. This means that even the most powerful computers would be unable to hack the qubits-based keys. It is easy to see why the idea is gathering the attention of players from all parts, ranging from financial institutions to intelligence agencies.
Toshiba's new technique to reduce fluctuations in optical fibers enabled the researchers to carry out QKD over a much larger distance than previously possible. "This is a very exciting result," said Mirko Pittaluga, research scientist at Toshiba Europe. "With the new techniques we have developed, further extensions of the communication distance for QKD are still possible and our solutions can also be applied to other quantum communications protocols and applications."
When it comes to carrying out QKD using optical fiber, Toshiba's 600-kilometer mark is a record-breaker, which the company predicts will enable secure links to be created between cities like London, Paris, Brussels, Amsterdam and Dublin.
Other research groups, however, have focused on different methods to transmit qubits, which have enabled QKD to happen over even larger distances. Chinese scientists, for example, are using a mix of satellite-based transmissions communicating with optical fibers on the ground, and recently succeeded in carrying out QKD over a total distance of 4,600 kilometers.
Every approach has its pros and cons: using satellite technologies is more costly and could be harder to scale up. But one thing is for certain: research groups in the UK, China and the US are experimenting at pace to make quantum networks become a reality.
Toshiba's research was partially funded by the EU, which is showing a keen interest in developing quantum communications. Meanwhile, China's latest five-year plan also allocates a special place for quantum networks; and the US recently published a blueprint laying out a step-by-step leading to the establishment of a global quantum internet.
'un-hackable' quantum network
over hundreds of kilometers using optical fiber
|
Apr. 2020 - Pentagon wants commercial, space-based quantum sensors within 2 years
"Quantum technologies will render all previously existing stealth, encryption, and communications technologies obsolete, so naturally the Pentagon wants to develop quantum technologies as a matter of national security."
|
The Pentagon wants space-based quantum sensing prototypes within the next two years.
Space-based quantum sensors are a major component of a proposed space-based quantum internet.
A quantum internet would be most plausible if it were built in space through a "constellation of satellites."
SpaceX is already building a "constellation of satellites" for beaming internet from space.
SpaceX was contracted by the Pentagon.
|
|
|
[excerpted] - the Air Force Research Laboratory has been investigating a variety of quantum-based sensors to create "secure, jam-resistant alternatives to GPS," according to National Defense Magazine.
And because quantum sensors can detect radar signatures and beyond, they may be used by the military to bypass just about any stealth technology.
Other potential applications could include Earth defense mechanisms that could detect, prevent, or respond to missile attacks, asteroids, and comets, as well as keeping track of satellites and space debris that whiz around Earth's orbit.
Additionally, a network of quantum technologies "could offer the military security, sensing and timekeeping capabilities not possible with traditional networking approaches," according to the US Army Research Laboratory.
If we take the idea of quantum sensors a step further and into the realm of quantum sensing networks, then we are looking at one component of a quantum internet, when combined with quantum computing.
"A quantum internet will be the platform of a quantum ecosystem, where computers, networks, and sensors exchange information in a fundamentally new manner where sensing, communication, and computing literally work together as one entity," Argonne Laboratory senior scientist David Awschalom told How Stuff Works.
The notion of a space-based quantum internet using "satellite constellations" is becoming even more enticing, as evidenced in the joint research paper, "Spooky Action at a Global Distance – Resource-Rate Analysis of a Space-Based Entanglement-Distribution Network for the Quantum Internet."
According to the scientists, "Recent experimental breakthroughs in satellite quantum communications have opened up the possibility of creating a global quantum internet using satellite links," and, "This approach appears to be particularly viable in the near term."
The paper seems to describe quantum technologies that are nearly identical to the ones the DIU is looking to build.
"A quantum internet would allow for the execution of other quantum-information-processing tasks, such as quantum teleportation, quantum clock synchronization, distributed quantum computation, and distributed quantum metrology and sensing," it reads.
|
Using advanced quantum technology and joining with world-leading institutions in quantum information science, Fermilab and its partners are expanding the laboratory's point-to-point network to a multinode system that will crisscross Chicagoland: the Illinois Express Quantum Network. IEQNET will connect Fermilab, Argonne National Laboratory and Northwestern University's Evanston and Chicago campuses in a flexible quantum-network architecture. |
|
|
Fermilab is America's premier national laboratory for particle physics research. A U.S. Department of Energy Office of Science laboratory, Fermilab is located near Chicago, Illinois, and operated under contract by the Fermi Research Alliance LLC |
Fermilab planted the seeds for a future quantum internet on its Batavia, Illinois, site in 2017 with the installation of the Caltech-led Fermilab Quantum Network, or FQNET. FQNET is a system developed through a long-term partnership with AT&T, Caltech and Fermilab. In 2018, FQNET successfully demonstrated quantum teleportation at the lab. FQNET also acts as a test bed for state-of-the-art systems developed by Caltech. This year, Caltech achieved a record rate of high-fidelity quantum teleportation. |
|
Using advanced quantum technology and joining with world-leading institutions in quantum information science, Fermilab and its partners are expanding the laboratory's point-to-point network to a multinode system that will crisscross Chicagoland: the Illinois Express Quantum Network. IEQNET will connect Fermilab, Argonne National Laboratory and Northwestern University's Evanston and Chicago campuses in a flexible quantum-network architecture. IEQNET leverages the research and technological advances of the FQNET program. This year, IEQNET demonstrated routing of entangled photons generated at FQNET between on-site nodes several kilometers apart.
IEQNET is part of a research program on quantum network technologies funded by the Department of Energy's Advanced Scientific Computing Research program, which also supports the Inter-campus Network Enabled by Atomic Quantum Repeater Nodes project, led by Brookhaven National Laboratory and Stony Brook University. The Inter-campus Network focuses on key quantum network technologies. The quantum internet blueprint provides a framework for researchers on both efforts work together to build a national quantum internet.
|
Quantum Key Distribution - in Space!
Executive Interview with David Mitlyng
DAVID MITLYNG: My background is with the space industry. I've spent over 20 years working at major satellite manufacturers, including big corporate giants like Hughes (now Boeing), Orbital Sciences (now Northrop) and SSL (now part of Maxar), before transitioning about six years ago to a startup called BridgeSat - now renamed BridgeComm, by the way.
|
There's this explosion in the space industry in what we call 'NewSpace' where there's venture capital coming into new and innovative ideas around space. So it was a good opportunity to come in and work at a startup that was commercializing optical communications, also known as laser communications. So I was the first employee of BridgeComm back a number of years ago. Now the company's grown and done very well around commercializing optical communications for satellites. They closed their Series B, a year or so ago. They're growing, getting very good business.
[snip]
DAVID MITLYNG:
"Quantum communications was invented roughly 30 years ago, with some groundbreaking papers written in the 80s and 90s. There were a number of research labs, research groups, and universities that started with these papers.
One of the leaders was the National University of Singapore.
Around the year 2000, they set up a quantum research group that eventually became the Centre for Quantum Technologies (CQT). It got very well-funded by the government of Singapore. They brought in Artur Ekert to run it. He's one of the original inventors of the quantum communications QKD protocols. They put together a very advanced lab and research group around doing some groundbreaking work with this new technology."
|
WEF warns of Cyber terror & need for global response.
Klaus Schwab:"We all know, but still pay insufficient attention, to the frightening scenario of a comprehensive cyber attack could bring a complete halt to the power supply, transportation, hospital services, our society as a whole. The COVID-19 crisis would be seen in this respect as a small disturbance in comparison to a major cyberattack.
To use the COVID19 crisis as a timely opportunity to reflect on the lessons the cybersecurity community can draw and improve our unpreparedness for a potential cyber-pandemic."
Jeremy Jurgens, WEF Managing Director:"I believe that there will be another crisis. It will be more significant. It will be faster than what we've seen with COVID. The impact will be greater, and as a result the economic and social implications will be even more significant." |
Cyber-attacks have dropped down the pecking order in terms of top global business risks but remain high on the priority list in North America and Europe, according to the latest World Economic Forum (WEF) data.
The annual Regional Risks for Doing Business report is compiled from over 12,000 responses from business leaders in 127 countries. They are presented with a pre-selected list of 30 global risks and asked to choose the five that they believe to be of most concern for doing business in their country over the next decade.
Unsurprisingly given the current financial and healthcare crisis, the top two global risks were unemployment and spread of infectious disease, followed by fiscal crisis. Spread of infectious disease also topped the priority list for business leaders regionally in Europe, Eurasia and East Asia and the Pacific.
However, although cyber-attacks fell from second place globally last year to fourth, they are still top-of-mind in the West.
They were named the number one risk of the next decade by North American business leaders, garnering a share of 55% versus infectious diseases in second with 30%. Cyber-risk was placed second in Europe but first in the UK, with 56% versus fiscal crises in second with 45%.
John Doyle, president and CEO of professional services firm Marsh, argued that the pandemic is also indirectly influencing organizations' cyber-risk levels.
"The COVID-19 crisis has shone a spotlight on organizational resilience. As firms look to the future, they are matching their risk and resilience arrangements with a threat landscape marked by significant customer and workforce behavioral shifts," he said.
"Just as economic and climate concerns will require firms to refocus business plans, a greater reliance on digital infrastructures will mean a marked increase in cyber-risk exposures. To optimize recovery, organizations will need to build greater preparedness into their business models in order to be more resilient in the face of future disruptions."
|
|
|
In 2017, Parag Khanna, Founder & Managing Partner of FutureMap-a data and scenario-based strategic advisory firm, wrote a short treatise, Technocracy in America: Rise of the Info-State.
When discussing the notion of "Big Data," Khanna noted that Singapore's prime minister is a computer scientist, and "With the completion of a nation-wide fiber optic Internet roll-out, Singapore's physical sensor network (‘Internet of Things'), provides enormous volumes of data . . ."
Khanna urged that Western democracy be replaced by Singaporean technocracy. According to Khanna,
". . . it's time to admit that America needs less of its own version of democracy-much less . . . Democracy alone just isn't good enough anymore."
He argued, "The search for an optimal state form continues into the information age-and it should logically be called the ‘Info-State'."
Khanna continued, "Info-states such as Switzerland and Singapore are also the places where we can witness the best efforts at direct technocracy . . . Experiments in direct technocracy are already visible around the world from Estonia and Israel to the UAE and Rwanda to India and China-across both democracies and non-democracies."
Khanna emphatically urged, "Technocracy becomes a form of salvation after society realizes that democracy doesn't guarantee national success. Democracy eventually gets sick of itself and votes for technocracy."
|
Singapore can play key role in Belt and Road Initiative:
|
"With China's growth, there is tremendous opportunity for China to do good for the rest of the world," he noted.
"This is an important historical opportunity for China to convince the rest of the world that actually its actions have a broader perspective of not just an immediate commercial gain to itself, or just to catalyse the local economy in the medium term. But more importantly, over the longer term, China is helping the world to build a better system that allows the world to participate in the next phase of growth for the world economy."
If China could use its growing power to do this, it would "win the trust and confidence of the world", he added, pointing to the phrase "以德服人" mentioned by President Xi when he delivered a well-received speech in Davos last year. This refers to using one's abilities in a benevolent way to benefit the community. This, he argued, was the underlying philosophy of the BRI, as he saw it.
If only Singaporeans Blog
|
How Singapore can gain from Silk Road project
It has been touted as one of the most ambitious plans of the 21st century so far. China's Belt and Road Initiative has not only gained attention because it spans Asia, Africa and Europe and covers 60 per cent of the world's population, but also because the participating countries cover around a third of the world's gross domestic product and world trade. They also contain 60 per cent of the world's population. Claire Huang looks at how it could help Singapore businesses and whether it will live up to its hype.
What is the BRI?
Unveiled in late 2013, the Belt and Road Initiative (BRI) - formerly known as One Belt, One Road - is Chinese President Xi Jinping's signature foreign and economic policy initiative.
It seeks to place China at the centre of the global trade network by recreating ancient trade routes - now billed as the Silk Road Economic Belt and a 21st Century Maritime Silk Road - across Asia, Africa and Europe.
The BRI is expected to attract trillions of dollars in infrastructure spending in 60 countries by connecting Asia, Africa and Europe over land through Europe-Asia continental roads, and sea routes through the South China Sea and Indian Ocean. This will be achieved through the use of rail, roads, waterways, airways, pipelines and information highways.
|
|
China will strengthen cooperation with Singapore to promote greater financial connectivity, according to officials.
Chen Yulu, vice governor of the People's Bank of China (PBOC), made the remarks at the China-Singapore (Chongqing) Connectivity Initiative Financial Summit 2020 held in southwest China's Chongqing Municipality.
"As an important part of China-Singapore strategic connectivity initiative, financial cooperation between the two countries has played a unique and important role in promoting the development and opening up of west China and expanding economic and financial cooperation between China and Singapore as well as other ASEAN countries," said Chen.
|
BEIJING, Dec. 11, 2020
The opening ceremony for this event was attended and addressed by Xu Hejian, Deputy Director of the Communication Department of the CPC Beijing Committee and Director of Information Office of Beijing Municipality, Fan Jianping, Director of CRI Online, and Luis Diego Monsalve, Colombian Ambassador to the People's Republic of China.
It was also attended by international social media influencers from Colombia, Croatia, Egypt, France, Italy, Switzerland, South Africa, UK and the U.S., as well as representatives from administrative departments and organizations concerned.
Silk Road Rediscovery Tour of Beijing is a specific measure for Beijing to implement the Belt and Road Initiative. As a brand activity to publicize Beijing to the world, seven such events have been celebrated for five years consecutively. This has become an important window to showcase the genuine image of Beijing.
|
|
Italy wants to enjoy the benefits of the alliance with the United States and at the same time take advantage of the economic opportunities of the Chinese market.
Italy's "China card" explains how the current Italian government intends to forge closer ties in trade, finance, and industrial cooperation with Beijing, even if that creates uncertainty – and potential tensions – with Washington. It is the realization among some of Italy's political and corporate elites that while the security of the country will continue to depend on the military alliance with the United States, Italy's economic well-being – severely hit by the pandemic-induced lockdowns – will increasingly depend on closer ties with the Asian giant.
Trans-Pacific View author Mercy Kuo inteviewed in The Diplomat
|
The U.K. government has authorized the sale of £2.6-billion worth of military and civilian equipment with potential military use to China in the past three years, government figures show.
Last year saw a tripling in exports to China of "dual use" items defined as "civilian goods with a military purpose." Some £1.6-billion worth were authorised in 2020, compared to £526-million in 2019.
The increase coincided with the beginning of the coronavirus pandemic in early 2020. The exports have been approved while China is identified by the British government as "an increasing risk to U.K. interests" and "the biggest state-based threat to the U.K.’s economic security."
Most British exports were for "dual use" equipment but £53-million worth classified purely as "military" went to China over the three years 2018-20, including components for combat aircraft and military support aircraft.
Other items licensed for use by China included military communications equipment and technology for air defense systems.
The U.K. has banned the sale of "lethal" military equipment to China since the Tiananmen Square massacre of 1989. However, the British exports are likely to benefit China’s air force, which British ministers claim is a growing military threat.
|
Anti Satellite missile tests
|
DoD report: China intends to pursue ASAT weapons despite its rhetoric against the militarization of space.
WASHINGTON - China is progressing with the development of missiles and electronic weapons that could target satellites in low and high orbits, the Pentagon says in a new report released Sept. 1.
China already has operational ground-based missiles that can hit satellites in low-Earth orbit and "probably intends to pursue additional ASAT weapons capable of destroying satellites up to geosynchronous Earth orbit," says the Defense Department's annual report to Congress on China's military capabilities.
DoD has been required by law to submit this report since 2000.
The Pentagon says Chinese military strategists regard the ability to use space-based systems and to deny them to adversaries as central to modern warfare. China for years has continued to "strengthen its military space capabilities despite its public stance against the militarization of space," the report says.
China has not publicly acknowledged the existence of any new anti-satellite weapons programs since it confirmed it used an ASAT missile to destroy a weather satellite in 2007, but the nation has been steadily advancing in this area, the report says. So-called counterspace capabilities developed by China include kinetic-kill missiles, ground-based lasers, orbiting space robots and space surveillance to monitor objects across the globe and in space.
Electronic weapons - such as satellite jammers, cyber capabilities and directed-energy weapons - also are part of China's arsenal of counterspace systems.
According to China's military strategy, an adversary's imaging, communications navigation and early warning satellites would be targeted in order to "blind and deafen the enemy," says the report.
Besides strengthening its anti-satellite weapons technology, the report notes, China is advancing space capabilities across the board - in satellites, launch vehicles, sensors and lunar systems, all intended to help fulfill China's long-term goal of becoming the world's most powerful space power.
|
|
Germany warns: AI arms race already underway
The world is entering a new era of warfare, with artificial intelligence taking center stage. AI is making militaries faster, smarter and more efficient. But if left unchecked, it threatens to destabilize the world.
An AI arms race is already underway. That's the blunt warning from Germany's foreign minister, Heiko Maas.
"We're right in the middle of it. That's the reality we have to deal with," Maas told DW, speaking in a new DW documentary, "Future Wars — and How to Prevent Them."
It's a reality at the heart of the struggle for supremacy between the world's greatest powers.
"This is a race that cuts across the military and the civilian fields," said Amandeep Singh Gill, former chair of the United Nations group of governmental experts on lethal autonomous weapons. "This is a multi-trillion dollar question."
Great powers pile in
This is apparent in a recent report from the United States' National Security Commission on Artificial Intelligence. It speaks of a "new warfighting paradigm" pitting "algorithms against algorithms," and urges massive investments "to continuously out-innovate potential adversaries."
And you can see it in China's latest five-year plan, which places AI at the center of a relentless ramp-up in research and development, while the People's Liberation Army girds for a future of what it calls "intelligentized warfare."
As Russian President Vladimir Putin put it as early as 2017, "whoever becomes the leader in this sphere will become the ruler of the world."
|
Next: The Perpetual
War Machine
against humanity
Scenario: The Fake BioTerror control Paradigm
for a 4th Industrial technocratic slave state