Adaptive Segmentationmicro-segmentation August 25, 2016

Air Force Cybersecurity, Surveillance Tools and more

Nathaniel Gleicher,

Four things I'm reading this week:

4 Things In Cyber

  1. Air Force Cybersecurity Innovation Priorities: The Air Force highlighted some of its research priorities this week, which included “advanced technologies for autonomous and goal-seeking network capabilities that can access and exploit communication mediums,” and a system to enable “first responders to entirely disconnect a non-cooperative organization from its network infrastructure and then selectively reform on a separate secure emergency network.” I’m reading:

  2. Two Stark Reminders You Shouldn't Trust Everything You Find on a Computer: Two examples this week of the ways that malicious actors are not just stealing or leaking information—they are changing information to create the message they want. Disturbingly, both examples look to be cases of governments looking to discredit (or, in one case, jail) their critics. We’re only going to see more of these integrity attacks as time passes. I’m reading:

  3. Understanding the Ethics of Self-Driving Cars: Studies increasingly show that self-driving cars will reduce accidents and fatalities. But they will also have to make automated decisions about who to spare and who to save—its passengers, or pedestrians? A research center at MIT is confronting this challenge by constructing a “moral machine”—a website where visitors judge driving scenarios, choosing between two bad outcomes. I’m reading: How will self-driving cars make life or death decisions?

  4. Government Hackers Use Private-Sector iPhone Surveillance Tool: The last two years have seen an increasingly heated debate sparked by Wassenaar arrangement negotiations around controlling the international distribution of internet surveillance tools. Much of the debate has centered on the problems that recent proposals posed for legitimate cybersecurity research. But stories like this—an Israeli company apparently selling a sophisticated iOS exploit kit used by the government of the UAE to spy on a human rights defender—are a stark reminder that as hard as it is to craft good controls over exchange of cybersecurity tools, the growing grey-and-black market in cyber exploit kits is something that we shouldn’t ignore. I’m reading: “Government Hackers Caught Using Unprecedented iPhone Spy Tool

Adaptive Segmentationmicro-segmentation
Share this post: