Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Image via Semantic Scholar

The Geomagnetic Jerk

April 24, 2019 by Marc Handelman in Geophysics, Chronometry, Chronoscopy, GIS, Physics, Physical Security, Information Security, Information Sciences, Must Read

Superb explanatory post - via Julien Aubert from l’Institut de physique du globe de Paris (CNRS/IPGP/IGN/Université de Paris), and writing at CNRS - focusing on the phenom of geomagnetic jerks. Today's Must Read.

April 24, 2019 /Marc Handelman
Geophysics, Chronometry, Chronoscopy, GIS, Physics, Physical Security, Information Security, Information Sciences, Must Read

PRC Begins CRISPR Editing Of Human Embryonic Tissues

November 27, 2018 by Marc Handelman in Genomic Editing, Medical Privacy, Genomic Security, Information Sciences

"via John Timmer, writing at Ars Technica, comes news of the use of Clustered Regularly Interspaced Short Palindromic Repeats (also known as CRISPR) gene editing efforts targeting the human genome, with (reportedly) live, human births as the result."

"The most complete report we currently have comes from the Associated Press. Its reporters talked to the researcher behind the announcement, He Jiankui of Shenzhen, China, in advance of his public announcement." - John Timmer, reporting at Ars Technica, comes word of CRISPR gene editing

November 27, 2018 /Marc Handelman
Genomic Editing, Medical Privacy, Genomic Security, Information Sciences

USPS: The Exposure

November 26, 2018 by Marc Handelman in USPI, USPS, Information Sciences, Data Loss Prevention

Where - exactly - was the United States Postal Inspection Service - the sworn law-enforcement (with arrest powers) investigatory component of the United States Postal Service in this? It took the quasi-governmental USPS over a year to catch this flaw? Astounding Incompetence.

"A report published in October found that the IV systems suffered from some misconfiguration problems, but none of them referred to adding access controls for reading user data, which is a baseline in information security." via Ionut Ilascu, writing in his outstanding news post at Bleeping Computer.

November 26, 2018 /Marc Handelman
USPI, USPS, Information Sciences, Data Loss Prevention

Artificial Intelligence, The Facial Recognition Debacle →

June 12, 2018 by Marc Handelman in Facial Recognition, Recognition Systems, Information Sciences, Information Security, Privacy, Privacy Prophylaxis, Artificial Intelligence

via Ben Coxworth, writing at NewAtlas, comes a fascinating discussion of an AI duel, of sorts. Squarely ensconced in the facial recognition arena, this is a story you won't want to miss. Today's Must Read!

'As concerns over privacy and data security on social networks grow, U of T Engineering researchers led by Professor Parham Aarabi (ECE) and graduate student Avishek Bose (ECE MASc candidate) have created an algorithm to dynamically disrupt facial recognition systems.' posted by Marit Mitchell, University of Toronto, U of T Engineering News

June 12, 2018 /Marc Handelman
Facial Recognition, Recognition Systems, Information Sciences, Information Security, Privacy, Privacy Prophylaxis, Artificial Intelligence

Image via Fraunhofer AISEC

Hardware Envelope, A Secure Conveyance →

May 18, 2018 by Marc Handelman in Hardware Security, Information Technology, Information Security, Information Sciences, Encryption

via Samuel H. Moore, writing at the IEEE's Spectrum Magazine, comes word of the 'Unhackable Envelope'. The Fraunhofer team (developers of the Unhackable Envelope) comprised of Vincent Immler - Fraunhofer Institute for Applied and Integrated Security (AISEC), Martin König - Fraunhofer Research Institution for Microsystems and Solid State Technologies (EMFT), Johannes Obermaier - Fraunhofer Institute for Applied and Integrated Security (AISEC), Matthias Hiller - Fraunhofer Institute for Applied and Integrated Security (AISEC) and Georg Sigl - Fraunhofer Institute for Applied and Integrated Security (AISEC) & Technical University of Munich (TUM) appeared at the IEEE International Symposium on Hardware Oriented Security and Trust in Washington, D.C. last week. Additionally, the group's paper 'B-TREPID: Batteryless Tamper-Resistant Envelope with a PUF and Integrity Detection' won the 2018 Best Paper Award at the confrenece (Kudo's are certainly in order!).

May 18, 2018 /Marc Handelman
Hardware Security, Information Technology, Information Security, Information Sciences, Encryption

Glyph Perturbation, The Science of Font Steganography →

May 14, 2018 by Marc Handelman in Information Security, Information Sciences, Graphics Technology, Steganography, Cryptology

via Chang Xiao, Cheng Zhang, Changxi Zheng, all from Columbia University, and presented at the ACM Transaction on Graphics (SIGGRAPH 2018), comes this phenomenal steganographic research; in which, a new methodology to hide information within documents utilizing manipulation of the fonts therein is laid bare, i.e., a new form of steganographic manipulation! Today's Must Read & watch the video below the Abstract.

"Abstract: We introduce FontCode, an information embedding technique for text documents. Provided a text document with specific fonts, our method embeds user-specified information in the text by perturbing the glyphs of text characters while preserving the text content. We devise an algorithm to choose unobtrusive yet machine-recognizable glyph perturbations, leveraging a recently developed generative model that alters the glyphs of each character continuously on a font manifold. We then introduce an algorithm that embeds a user-provided message in the text document and produces an encoded document whose appearance is minimally perturbed from the original document. We also present a glyph recognition method that recovers the embedded information from an encoded document stored as a vector graphic or pixel image, or even on a printed paper. In addition, we introduce a new error-correction coding scheme that rectifies a certain number of recognition errors. Lastly, we demonstrate that our technique enables a wide array of applications, using it as a text document metadata holder, an unobtrusive optical barcode, a cryptographic message embedding scheme, and a text document signature." - via Chang Xiao, Cheng Zhang, Changxi Zheng, all from Columbia University.

May 14, 2018 /Marc Handelman
Information Security, Information Sciences, Graphics Technology, Steganography, Cryptology

From Solving a Higgs optimization problem with quantum annealing for machine learning [https://www.nature.com/nature/journal/v550/n7676/full/nature24047.html ]

The Uncovering →

November 01, 2017 by Marc Handelman in AI Security, All is Information, Information Sciences, Machine Learning, Quantum Mathematics

Via Chris Lee - writing at Ars Technica, comes news of the 'uncovering' of the Higgs Boson particle via the utilization (in the machine-learning realm) of a D-Wave Quantum Computational Device.

'The discovery of Higgs-boson decays in a background of standard-model processes was assisted by machine learning methods 1, 2. The classifiers used to separate signals such as these from background are trained using highly unerring but not completely perfect simulations of the physical processes involved, often resulting in incorrect labelling of background processes or signals (label noise) and systematic errors.' - via Nature 550, 375–379 (19 October 2017) doi:10.1038/nature24047

November 01, 2017 /Marc Handelman
AI Security, All is Information, Information Sciences, Machine Learning, Quantum Mathematics

Splunked, The Leak →

April 06, 2017 by Marc Handelman in All is Information, Analytics, Attack Analysis, Data That Is Big, Information Sciences, Information Security

via the eponymous Richard Chirgwin, whilst writing at El Reg, comes this unfortunate tale of security flaws within Splunk Enterprise (now, happily patched). First discovered by John Page (aka hyp3rlinx), and published via an advisory at Full Discosure. Here's hyp3rlinxs' source.

For the Record: We have always been pleased with Splunk products, and, most importantly, they are fast and focused when fixing issues.

The takeway? Make an effort to be extraordinarily cognizant of the threats posed by log and machine generated data aggregation in the enterprise. That is all.

April 06, 2017 /Marc Handelman
All is Information, Analytics, Attack Analysis, Data That Is Big, Information Sciences, Information Security

CTI Summit 2017, Threat Intelligence At Microsoft - A Look Inside →

March 14, 2017 by Marc Handelman in All is Information, Conferences, Information Sciences, Intelligence, Threat Intelligence
March 14, 2017 /Marc Handelman
All is Information, Conferences, Information Sciences, Intelligence, Threat Intelligence

Machine-Based Investigation: Fully →

March 14, 2017 by Marc Handelman in All is Information, Analytics, Computation, Data That Is Big, Exploration, Fingerprinting, Information Sciences, Intelligence, Robots, Machine Learning

via Motherboard writer Michael Byrne, comes this well-wrought piece on the apparent proliferation of 'bots on Twitter, ie., the implications of algorithm-driven entities on the Twitterverse. The fascinating component to this study by Onur Varol, Emilio Ferrara, Clayton A. Davis, Filippo Menczer and Alessandro Flammini, was the utilization of a machine-learning apparatus (and the feature-sets therein) to tease out the truth. Additional documentation (in the form of the paper) is available on arXIv. Today's MustRead.

"Part of what makes the new research interesting is the sheer number of features used in the classification model..." - Motherboard's Michael Byrne

March 14, 2017 /Marc Handelman
All is Information, Analytics, Computation, Data That Is Big, Exploration, Fingerprinting, Information Sciences, Intelligence, Robots, Machine Learning

DARPA Visits Planet Meta →

January 16, 2017 by Marc Handelman in All is Information, Automation, Brilliant, US Armed Forces, United States of America, Science, Innovation, Information Sciences

Superb post at DARPA, detailing the Agency's plans to go Meta... Today's Must Read.

January 16, 2017 /Marc Handelman
All is Information, Automation, Brilliant, US Armed Forces, United States of America, Science, Innovation, Information Sciences

Judah Levine, Time Lord

March 09, 2016 by Marc Handelman in All is Information, Information Sciences, Time, Time Computation, Communications, Computation, Compute Infrastructure, Common Sense, Computer Science, Control Systems

The relatively (speaking) untold story of Judah Levine, Ph.D. and NIST. Enjoy!

March 09, 2016 /Marc Handelman /Source
All is Information, Information Sciences, Time, Time Computation, Communications, Computation, Compute Infrastructure, Common Sense, Computer Science, Control Systems

Internet Without Screens →

November 02, 2015 by Marc Handelman in All is Information, Information Sciences, Information Sharing, Information Security, Infrastructure, Internet
November 02, 2015 /Marc Handelman
All is Information, Information Sciences, Information Sharing, Information Security, Infrastructure, Internet

Kurzgesagt, What is Life? →

June 25, 2015 by Marc Handelman in All is Information, Information Sciences, Science, Natural Science, Natural Philosophy
June 25, 2015 /Marc Handelman
All is Information, Information Sciences, Science, Natural Science, Natural Philosophy

For Gizmodo, The Information Age Is Over →

May 20, 2015 by Marc Handelman in All is Information, Information Sciences, Information Security

Yes, the Information Age is supposedly kaput... Bid a Hearty Welcome to the Infrastructure Age; if Gizmodo is to be trusted with the proverbial crystal ball, that is.

Evidently, they are unaware that everything is, of course, information...

May 20, 2015 /Marc Handelman
All is Information, Information Sciences, Information Security

Big Data Techniques for Cyber Security

February 01, 2015 by Marc Handelman in All is Information, Data Security, Information Sciences, Information Security, Intelligence
February 01, 2015 /Marc Handelman
All is Information, Data Security, Information Sciences, Information Security, Intelligence

Supercalifragilistic Reidentifiability →

January 31, 2015 by Marc Handelman in All is Information, Computation, Computer Science, Data Security, Database Security, Information Security, Information Sciences, Intelligence

Well documented paper on the capability to identify entities via credit card metadata [i.e., the identification is based on what was once thought to be anonymous big data...]. Time to move back to currency transactions. Tout Simplement Incroyable.

January 31, 2015 /Marc Handelman
All is Information, Computation, Computer Science, Data Security, Database Security, Information Security, Information Sciences, Intelligence

NIST Forensics Committees, Public Meetings

January 28, 2015 by Marc Handelman in All is Information, Education, Government, Governance, Information Security, Information Sciences, Intelligence

News, of planned public meetings - slated for February 16 and 17, 2015, in balmy Orlando, Florida - called by the Organization of Scientific Area Committees (OSAC). The Forensic OSAC  acts as the coordinator of development of required standards and guidelines for the Forensic Science community. All, carefully crafted under the oversight of the National Institute of Standards and Technology (NIST),

January 28, 2015 /Marc Handelman
All is Information, Education, Government, Governance, Information Security, Information Sciences, Intelligence

Spook First Programme →

January 16, 2015 by Marc Handelman in All is Information, Government, Information Security, Information Sciences, Intelligence, National Security, United Kingdom

 

News via The Independents' Whitehall editor Oliver Wright, of an innovative plan to engage recent graduates in the United Kingdom, by the United Kingdoms' Government Communications Headquarters. Something of a mashup is being mulled over, between serving in the ranks of GCHQ with an eye for opportunities further on down the line, when it's time to muster out. A similar model is in place for many Israeli military and intelligence personnel, post-service.

January 16, 2015 /Marc Handelman
All is Information, Government, Information Security, Information Sciences, Intelligence, National Security, United Kingdom

'We Don't Have An Algorithm For This'

November 18, 2014 by Marc Handelman in All is Information, Complexity, Computation, Computer Science, Identity Management, Information Sciences, Information Security, Physical Sciences, Science

via Dr. Holger Sierks, a Max-Planck-Gesellschaft Scientist and Principal Investigator, leading the team working on the OSIRIS (Optical, Spectroscopic, and Infrared Remote Imaging System) on-board the Philae, describing the effort taken by human researchers when analyzing images of the comet...

The ramifications to many endeavors, ranging from automated driving, to automated information and physical security functionality (identity management, authentication, access control, biometrics, image recognition, et cetera)  are startling, when confronted with new visages, we have yet to develop algorithmic capabilities to manipulate the data, and bend it to our will. EOM

November 18, 2014 /Marc Handelman
All is Information, Complexity, Computation, Computer Science, Identity Management, Information Sciences, Information Security, Physical Sciences, Science
  • Newer
  • Older