SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Technical analysis for shorts & longs -- Ignore unavailable to you. Want to Upgrade?


To: Johnny Canuck who wrote (52434)6/8/2016 6:28:36 AM
From: Johnny Canuck  Read Replies (1) | Respond to of 67576
 
Software as Weaponry in a Computer-Connected World
By NICOLE PERLROTHJUNE 7, 2016
Continue reading the main storyShare This Page
Photo

Credit Christoph Hitz
SAN FRANCISCO — The internet was created nearly 40 years ago by men — and a few women — who envisioned an “intergalactic network” where humans could pull data and computing resources from any mainframe in the world and in the process free up their minds from mundane and menial tasks.

“The hope is that, in not too many years, human brains and computing machines will be coupled,” wrote Joseph Carl Robnett Licklider, who was known as “Lick” and is the man widely remembered as the Internet’s Johnny Appleseed. Mr. Licklider joined the Pentagon in 1962, and his ideas later formed the basis for the military’s primordial internet work.

Even a big-vision idealist like Mr. Licklider could never have imagined that more than 50 years later, we would be telling the internet our deepest secrets and our whereabouts, and plugging in our smartphones, refrigerators, cars, oil pipelines, power grid and uranium centrifuges.

And even the early internet pioneers at the Pentagon could not have foreseen that half a century later, the billions of mistakes made along the way to creating the internet of today and all the things attached to it would be strung together to form the stage for modern warfare.

It is rare to find a computer today that is not linked to another, that is not baked with circuitry, applications and operating systems and that has not — at one point or another — been probed by a hacker, digital criminal or nation looking for weaknesses to exploit for profit, espionage or destruction.

Advertisement

Continue reading the main story
There is plenty of raw material to work with. On average, there are 15 to 50 defects per 1,000 lines of code in delivered software, according to Steve McConnell, the author of “Code Complete.” Today, most of the applications we rely on — Google Chrome, Microsoft, Firefox and Android — contain millions of lines of code. And the complexity of technology is increasing, and with it the potential for defects.

The motivation to find exploitable defects in widely used code has never been higher. Governments big and small are stockpiling vulnerabilities and exploits in hardware, software, applications, algorithms and even security defenses like firewalls and antivirus software.

They are using these holes to monitor their perceived enemies, and many governments are storing them for a rainy day, when they might just have to drop a payload that disrupts or degrades an adversary’s transportation, energy or financial system.

They are willing to pay anyone who can find and exploit these weaknesses top dollar to hand them over, and never speak a word to the companies whose programmers inadvertently wrote them into software in the first place.

The world caught one of its first glimpses of the market for vulnerabilities this year when James B. Comey, the director of the Federal Bureau of Investigation, suggested that his agency paid hackers more than $1.3 million for an iPhone exploit that allowed the F.B.I. to bypass Apple’s security.

That is on par with what other companies that buy and sell bugs to governments, like Zerodium, have offered to pay. Zerodium said it paid hackers $1 million for information on weaknesses in Apple’s iOS 9 operating system last fall, but the company resells those weaknesses to governments at a markup.

Those who follow the bug-and-exploit trade market closely caught an even bigger glimpse of its sponsors last summer when an Italian outfit called Hacking Team — which packages weaknesses into surveillance tools for governments across the globe — was itself hacked.

The leaks revealed a long customer list, including police departments, law enforcement and intelligence agencies in the United States, Europe and countries like Bahrain, Ethiopia, Sudan, Uzbekistan, Kazakhstan, Azerbaijan and Morocco.

Advertisement

Continue reading the main story
But the market for exploitable bugs is much bigger than Hacking Team’s client list, and nations have been paying huge sums to hackers willing to turn over those weaknesses to governments, and withhold them from software companies, for more than 20 years.

In most cases those holes have been used for espionage, but increasingly they are being used for destruction. Stuxnet, the American-Israeli computer worm that was used to destroy centrifuges at Iran’s Natanz nuclear facility in 2009 and 2010, used four vulnerabilities in Microsoft Windows and one in a printer service to attack and spin Iran’s uranium centrifuges out of control, or stop spinning them entirely.

Once Stuxnet and its motivations were uncovered — first by a security researcher in Belarus and then around the world — a Pandora’s box was opened.

Today, more than 100 governments have publicly acknowledged their own offensive cyberwar programs. Countries that were not in the market before Stuxnet was discovered are in it now.

Iranian officials now claim to have the third-largest digital army in the world behind the United States and China. Those claims are impossible to verify, in large part because most countries keep such programs secret. But Iranian hackers have made plenty of demonstrations.

Government officials in the United States hold Iranian hackers responsible for what they describe as a retaliatory attack against Saudi Aramco in 2012 that replaced the data on 30,000 Aramco computers with an image of a burning American flag.

The next year, Iranian hackers were blamed for a series of attacks on the United States banking system. And while security experts who have analyzed those attacks claim that the Iranians’ abilities are still nowhere near those of the United States and its closest allies, they are steadily improving.

Nations took a while to catch on to the wartime potential of the internet, but countries are now doubling down on their digital attack capabilities.

The verdict is still out on whether attacks like Stuxnet violate international law. Digital espionage, like the Chinese hacking of the Office of Personnel Management discovered last year, does not. And even when such attacks violate domestic laws, the penalties are not much of a deterrent to attackers punching keystrokes from the other side of the world.

Continue reading the main story
RELATED COVERAGE
F.B.I. Director Suggests Bill for iPhone Hacking Topped $1.3 Million APRIL 21, 2016

Hackers Took Fingerprints of 5.6 Million U.S. Workers, Government Says SEPT. 23, 2015

Cyberattack on Saudi Oil Firm Disquiets U.S. OCT. 23, 2012

SHOW ALL
What's Next
Loading...
Go to Home Page »
SITE INDEX THE NEW YORK TIMES

Site Index Navigation
NEWS

World
U.S.
Politics
N.Y.
Business
Tech



To: Johnny Canuck who wrote (52434)6/13/2016 3:53:44 PM
From: Johnny Canuck  Read Replies (1) | Respond to of 67576
 
Why Microsoft bought LinkedIn for $26 billion, in one word: Cortana
Know everything about your business contact before you even walk into the room.

linkedin in one image
The Microsoft-LinkedIn deal, in one image. Credit: Microsoft
23COMMENTS
Mark Hachman
Mark Hachman | @markhachman
Senior Editor, PCWorld Jun 13, 2016 9:40 AM
The image above says it all: Microsoft spent $26.1 billion to ensure that you’ll never walk into a meeting “cold” again.

Picture a typical business trip: meetings all day, drinks at night. A good salesperson knows his or her contacts before he or she steps foot in the door. But that goes for coworkers as well: How you you make them feel comfortable? How do you make them part of a team? How do you let them know who to approach, both inside and outside the company?

All of this usually takes some effort on your part, or at least a competent assistant. And that’s the role that Microsoft hopes to play, especially with its digital assistant, Cortana, and Office 365.

Right now, Cortana provides some basic information about your calendar, suggesting, for example, what time you’ll need to leave to ensure you arrive at your next meeting on time. In Microsoft’s digital future, Cortana will be able to sum up what you need to know both about your business relationship, and what information you can use to cement a more personal connection, too. It sounds smarmy, but a good salesperson will tell you that an emotional connection helps seal the deal.

If the thought of Microsoft owning more data about you—well, you probably should go delete your LinkedIn profile, now. Microsoft already knows your calendar (Outlook), your meetings (Outlook), your coworkers (Delve) your accounts (Microsoft Dynamics CRM) and some of your expertise (Delve). Microsoft calls this the Office Graph.

linkedin microsoft graphs
Microsoft
Here’s what Microsoft and LinkedIn see the data they know about you.
For his part, Jeff Weiner, the chief executive of LinkedIn, said that his company envisions a so-called “Economic Graph,” a digital representation of every employee and their resume, a digital record of every job that’s available, as well as every job and even every digital skill necessary to win those jobs. LinkedIn also owns Lynda.com, a training network where you can take classes to learn those skills. And, of course, there's the LinkedIn news feed, where you can keep tabs on your coworkers from a social perspective, as well.

Buying LinkedIn brings those two graphs together and gives Microsoft more data to feed into its machine learning and business intelligence processes. “If you connect these two graphs, this is where the magic happens, where digital work is concerned,” Microsoft chief executive Satya Nadella said during a conference call.

Microsoft will use the LinkedIn information to empower applications like Delve—which is already part of Office 365. By making Office 365 a more potent application, Microsoft sells more Office 365 subscriptions, specifically to enterprises and small businesses—and possibly sell Lynda training subscriptions right alongside. There are already 1.2 billion Office users, and 70 million Office 365 monthly users in business, Microsoft said. Add to that the 433 million users who have already signed up for LinkedIn (though only 105 million actively use it per month) and Microsoft feels like it can make the two networks, together, indispensable.

Was that synergy really worth $26.1 billion, especially after Microsoft essentially blew $7.2 billion chasing Nokia’s handset business? Well, think about this: LinkedIn is essentially the Facebook of the business world, and the digital repository of most of the world’s resumes. You may lie to your friends about whether or not you like Journey, but very few people lie about their resumes to potential employers. And that’s information that Microsoft is willing to pay for.