Microsoft founder and general do-gooder Bill Gates has expressed concerns about artificial intelligence (AI), warning that dystopian futures portrayed in series like Battlestar Galactica and Terminator could become a reality.
Gates issued the warning during a Reddit question and answer session, arguing that artificially intelligent systems could become a threat to humanity if left unchecked.
"I am in the camp that is concerned about super intelligence. I agree with Elon Musk and some others on this and don't understand why some people are not concerned," Gates said in response to a question about the threat posed by AI.
"First, the machines will do a lot of jobs for us and not be super intelligent. That should be positive if we manage it well. A few decades after that, though, the intelligence is strong enough to be a concern."
Gates is one of many tech moguls to warn of the danger posed by AI. Professor Stephen Hawking expressed concerns about self-learning machines earlier this year, and Tesla founder Elon Musk argued that AI poses the biggest risk to humanity if it is not properly monitored and controlled.
Luckily for the tech-savvy members of society, Gates said that humans are likely to serve some purpose for our robot overlords in the immediate future.
"It is safe for now. It is also a lot of fun and helps shape your thinking on all issues to be more logical. There is a prospect for change in this area for the next generation, but that is true for most fields and understanding how to program will always be useful," he said.
Gates' comments follow the widespread release of Microsoft's Cortana digital voice assistant. Cortana debuted on Windows Phone 8 and allows web searches and the opening of apps using voice commands.
Cortana's answers are based on data stored in the user's Microsoft account and the public internet, and the service will be integrated into Microsoft's Windows 10 operating system.
Gates closed his doomsday report by promising that Cortana will not betray us and is simply a useful service designed to help, not rule over, humans.
By V3's Alastair Stevenson
Cyber security is normally highlighted as a concern for corporations and celebrities, not something to worry school children.
But a group of students aged nine to 17 from the Digital Youth Council showcased an internet safety tool at BETT 2015 consisting of a series of mini games aimed at educating kids about online threats such as data theft and hacking.
The tool injects fun into the complex and often sinister world of cyber security, and was developed using the resources of Virgin Media Business, which established the Digital Youth Council in December 2014.
V3 wondered whether kids really need to concern themselves with the threat of cyber attacks, but Gerry Arthurs (pictured), director of public sector at Virgin Media Business, suggested that it is not as unusual as one might expect.
"The idea was generated by the children themselves, and it was they who communicated to us not just the cyber security [concerns], but the fallout, the stress and panic that they could see in their parents when they thought things had gone wrong," he said.
Arthurs explained that today's children are "much more educated in what's occurring in the world around them", and are aware of news coverage of major cyber attacks.
He also pointed out that today's children have experienced cyber attacks first hand. His 12-year-old daughter suffered emotionally when her Instagram account was hacked, which made her more aware of data protection.
The Digital Youth Council has taken a positive step towards cyber security education, but it shows just how rampant cyber attacks have become when children are directly exposed to and affected by malicious hacks simply because they have access to the latest technology.
The flipside is that increased awareness may make it easier to tackle cyber threats as children avoid the digital mistakes of their parents.
It also hammers home the extent to which technology is embedded is in the lives of children, as many have access to cutting edge hardware from the moment they are able to swipe a touchscreen.
Some could argue that this access leads to a loss of innocence, but technology is a way of empowering children and allowing them to be more innovative in their learning and development.
It is inescapable that future generations will be more tech-savvy than their predecessors, and keener to adopt the latest cutting-edge technology.
The US National Security Agency (NSA) posted an intriguing message on its Twitter account over the weekend, in a novel way to appeal to those who have an aptitude for cracking codes and ciphers.
Usually the NSA's careers Twitter account posts up short, bland opportunities for applications, but this one is very different.
It is very obviously a cipher, and looks a lot like one that uses substituted letters. The question mark is something of a clue and suggests that the NSA is happy to leave such hints.
There are various ways and means of cracking substitution ciphers and one of them is to start with the letter E - the most commonly used of English letter characters, and work back from that.
We can confirm that the advert is not actually a job ad, but is more of a knowing wink in the direction of people that like codes and ciphers, want a job with the NSA, and are not Edward Snowden. You can see the solution to the NSA code puzzle in this YouTube video.
Last year the UK agency GCHQ carried out a similar experiment to help it in its search for the next Alan Turing. At the time GCHQ's head of resourcing, Jane Jones, said that modern threats require new ways of finding talented people to help crack complex codes.
"We want employees who have evolved with the ever-changing digital world and therefore have the right skills to combat these challenges," she said at the time. "It's a puzzle but it's also a serious test - the jobs on offer here are vital to protecting national security."
For years data protection watchdog the Information Commissioner’s Office (ICO) was regarded as a toothless tiger.
It sounded big and scary and delivered stern warnings about the importance of data protection, but it could do very little about any data breaches, except perhaps wag its finger.
Then in 2010 everything changed. It was given fining powers to the tune of £500,000 and since then it has levied over £4m against organisations. But some may now consider it something of a heartless hound.
The latest to fall foul of the ICO’s desire for justice is the British Pregnancy Advisory Service (BPAS). The charity provides help and guidance for women with an unplanned pregnancy, from abortions to counselling and more besides.
For some its work is contentious and in March 2012 an anti-abortion hacker used his computing skills to wreak havoc on its website, defacing it and stealing details about those who had contacted the charity for help.
The hacker – James Jeffrey – got almost three years in prison as a result of the incident.
As the hack affected personal details of members of the public, the ICO got involved and its investigation found several technical lapses at the BPAS that made the incident worse than it should have been.
The long and short of it is that the BPAS now faces a fine of £200,000 for an incident which, as its CEO Ann Furedi understandably points out, was caused by a hacker who is now almost seeing his actions rewarded.
“We accept that no hacker should have been able to steal our data, but we are horrified by the scale of the fine, which does not reflect the fact that BPAS was a victim of a serious crime by someone opposed to what we do,” she said.
“It is appalling that a hacker who acted on the basis of his opposition to abortion should see his actions rewarded in this way."
Furedi also said the fine was “out of proportion” when compared with others the ICO has handed out, especially when those organisations’ breaches were not caused by criminal behavior.
- Glasgow City Council fined £150,000 after losing 74 unencrypted laptops, including one containing more than 6,000 people's bank records.
- Aberdeen City Council fined £100,000 after a member of staff inadvertently posted data relating to the care of vulnerable children online.
- Islington Council fined £70,000 after details of over 2,000 residents were released online due to a basic misuse of Excel by a staff member.
Even if the BPAS pays its fine early – by the end of March – it still faces paying £160,000, more than any of those listed above.
None of this is to say the ICO has acted unreasonably though: it has to enforce the law and if it encounters incidences of poor data protection – as in this case – it must take a stand so others sit up and take notice. If other firms and charities up their game after seeing a fine being levied, the public are better protected.
Conversely, if it does not issue a fine, it will be seen as weak and unwilling to take a stand, while any organisation that is fined can make a claim to being harmed. A council delivers vital frontline services and a fine will hamper its efforts to do this, it could be argued.
Clearly, this is a controversial case, driven by the scale of the fine. The fact this money will end up in government coffers – having been given to charity – is also questionable, as noted by Stewart Room, partner at law firm Field Fisher Waterhouse.
“The users of the BPAS charity services have high expectations of privacy and any security weakness that could expose them is bound to trouble the regulator,” he said.
“But the financial penalty regime here is moving money from the collection jar direct to The Treasury. Perhaps the cash could be better spent on improving security and data protection at the charity?"
The BPAS is now appealing the fine in what could prove a fascinating case to see if the ICO's desire to fine can be tamed.
By V3's Dan Worth
As noted by myself and numerous big-name figures in the public and private sector, the damage the PRISM spying scandal could inflict on the global economy and key industries, such as the cloud, is catastrophic. By being caught snooping not only on foreign firms, but also a number of political figures in countries that are supposedly allied with the US, the NSA seriously damaged international trust.
This was showcased to great effect in 2013 when Deutsche Telekom said it was considering re-routing all user information through German data centres and servers, in a bid to protect its customers from NSA snooping.
For this reason, I was overjoyed last week when president Barack Obama promised he was going to explain what new measures and safeguards he planned to put in place to ensure a scandal like PRISM does not reoccur.
However, come the big day when he took the stage and began outlining the new measures, my feelings towards his proposed reforms were at best mixed.
On the one hand Obama got a lot right. The US president said he would work to change the way PRISM requests could be handed to companies and increase the amount of information that the businesses involved can disclose to the public.
Specifically Obama pledged to put in place a series of fresh measures created by the attorney general, on how requests using the US Foreign Intelligence Surveillance Act (FISA) and National Security Letters can be made.
FISA and National Security Letters were used by the NSA to force numerous companies, including Google, Yahoo, Apple and Microsoft, to hand over vast amounts of customer data. The nature of the requests means the companies are not allowed to disclose what information was handed over without risk of arrests. The secret nature of the requests is one of the key reasons many people and businesses are still concerned about the safety and sovereignty of their data.
Even better, Obama also promised to make sure the public sector and general public would be represented in the approval process of data-gathering campaigns. He pledged to create a new independent, non-governmental panel of advocates to appear at the secret courts, which will approve or deny operations such as PRISM. Candidates for the new panel of advocates will be approved by congress.
All this sounds great, right? Well on one level it was...until Obama went on the offensive against PRISM critics, boldly saying the US would not apologise to groups or countries affected by PRISM.
"Many countries, including those that feigned surprise following the Snowden revelations, are trying to penetrate our networks. Our agencies will continue to gather intelligence on foreign governments' intentions. We will not apologise for doing it better," he said.
Worse still, in a move all too familiar to those that lived through the Bush era, Obama resorted to constantly mentioning 9/11 as a justification for operations such as PRISM. For me, this is serious cause for concern.
After all, Obama failed to disclose key details, such as what information, or how soon after receiving FISA requests companies will be able to reveal to their customers that they handed information to the NSA. Additionally, by vetting candidates for the new independent, non-governmental panel of advocates through congress – a body full of individuals that serve the US – it's unlikely that European businesses' concerns will be high a high priority.
As a consequence, while the new reforms have the potential to help ensure scandals such as PRISM don't reoccur, they also have the potential to be completely ineffectual; the outcome will be determined by how the US government choses to implement them. As a result, for now at least I can't see Obama's reforms winning back the trust of any concerned European business or governments.
By V3's Alastair Stevenson
Building the UK's cyber security skill base and economy has been an ongoing goal of the UK government and its Cyber Security Strategy.
As such, many were no doubt pleased when Russian advanced persistent threat-buster and protector of all things nuclear, Kaspersky Labs opened a new 200-person office in London, promising that it will play a pivotal role in its crusade to "save the world from hackers".
Company founder and cyber-doomsday prophet, Eugene Kaspersky was on hand at the London launch – attended by V3 and all the other security movers and shakers – and went so far as to list the office as one of the firm's new command centres.
"Our mission is [to] save the world - it's really simple and easy to remember," he said. "This office space will be responsible not just for Great Britain's operations, but also for Europe and a little bit of global. We're recognising London as a great place, as an international city, where its easier to find the right people for our business that can help us to protect our customers and to save the world."
However, despite his bold statement, speaking to V3, Kaspersky said it wouldn't be superhero white hats that would lead the fight in the London office, but some of the UK's "best and brightest" pencil pushers and salesmen.
"This office will mainly be responsible for the sales and marketing team. Here it will be for Britain and Europe. This is a great city as it's global and its easier to find people that can work internationally than it is in places like Moscow, Germany and France. This is one of the main reasons we moved the command centre of our European operation to London," Kaspersky said.
Confused? So were we. How can salesmen save the world? However, the UK's going through a pretty big cyber skills drought at the moment, and pretty much every company and government agency is reporting difficulty finding cyber-savvy recruits. Even the newly launched National Crime Agency recently had to recruit unskilled people for its cyber team on specialist "training" scheme contracts late last year.
As a consequence it's actually probably a good thing Kaspersky's going to stick with its tried-and-tested Russian security gurus when it comes to actually taking on the malware-makers, as Mr Kaspersky explained.
"Most of our research and development is still based in Russia because the Russian engineers are the best. We're happy with Russian engineers and we know many British companies are happy with Russian engineers as well. It's the same in Silicon Valley and Israel. Everybody wants the best and that's them," he said.
Luckily, for any aspirational British white hat, Kaspersky did confirm he's on the hunt for a new member to his elite Global Research and Analysis Team (Great), so all is not lost for wannabe UK cyber experts.
"We have our security experts team and that's very international, we have people from everywhere in there. So we are looking for UK security experts as well, but only the best of the best," he told V3.
However, to any budding cyber expert looking to get into the team, be warned, you'll have some pretty big shoes to fill. For those who don't remember Great is an award-winning team responsible for finding and dissecting numerous bits of top-end malware, including the notorious Flame, Red October and Icefog campaigns.
Jobs will be needed, though, especially if 2013 is anything to go by. Last year saw an influx of advanced threats and if current forecasts are anything to go by, things are only going to get worse in 2014.
With this in mind – while we're still a little disappointed the London office won't be doing research and development – we can't help but wish the London marketers and any Brit lucky enough to get onto Kaspersky's elite team the best of luck.
By V3's Alastair Stevenson
The New Year is barely a few days old but already the headlines are dominated by security stories of hacks and data thefts from major companies in the form of Skype and Snapchat.
For Skype, this saw its Twitter account and blogs targeted, while Snapchat had data on 4.6 million users released online in a warning to the firm about the need to take security seriously.
For firms of all shapes and sizes the fact security incidents are so immediately in the headlines for the start of the year should serve as a warning. 2013 was full of similar incidents and prove that no firm can rest on its laurels.
Indeed, while the PRISM spying scandal dominated the majority of the security agenda, it is important not to overlook stories such as the hacking of the Lakeland website as proof firms of all types face threats from cyber criminals.
The incidents prove that security is not a static area, but one where criminals and good-hearted ethical hackers are in a constant arms race to try and out do one another and find vulnerabilities to exploit them.
Firms cannot just assume that a single solution will cover everything or that a staff seminar on the things to be aware of such as phishing emails that is delivered in January will be relevant by next December, or even February for that matter.
Perhaps there is a silver lining for the industry from the incidents at Skype and Snapchat, though.
IT chiefs and those with security in their remit can use these incidents at the start of 2014 to make sure all those in charge at the company, especially those holding the purse strings, take security seriously and ensure that adequate resources are provided to help protect the firm from the risks that are present and growing all the time.
Otherwise, it could well be your firm in the headlines for all the wrong reasons.
MUNICH: Afraid of the dark? Perhaps you should be afraid of the lights. That's the twisted future envisioned by light bulb-wielding Fujitsu chief technology officer Joseph Reger.
Patrolling the floors of the Fujitsu Forum in Germany, Dr Reger explained to onlookers how one of the most innocuous objects in your house could become part of a global attack.
The Internet of Things, perhaps one of the most highly-talked about technologies nobody in the real world actually uses, is expected to take hold within the next decade, and with it will inevitably come cyber threats, as with any new technology. Reger chose to use intelligent light bulbs as an example:
"I'm not concerned about someone hacking into your home and turning off your lights," he said. We at V3 are very concerned about that, for the record. "What I'm talking about is that someone hacking into your home and looking at the usage pattern of your light bulbs and determining whether you're on vacation. And when it might be a good time to break in."
Such concerns have been voiced before with Philips' Hue lightbulb singled out as a cause for concern by security researchers. Reger went further, though, to envision a world of slave lightbulbs run by some sort of domestic super villain.
"If this light bulb is a little bit more intelligent, if they're intelligent enough, you can inject malicious code into the bulb itself if it's not protected properly. What's the problem with that? All of a sudden I have an army of attackers I've just programmed and I can launch a denial of service attack on anybody using billions of soldiers."
We've heard this described before in the form of toaster armies mining the currency Bitcoin - and perhaps the metaphors are getting out of hand - we're sure Reger knows this, and we have to say we enjoyed his demonstration.
The real point here is that we haven't moved on from this novelty, this funny notion of light bulbs stealing your lunch money and laughing at you. In the world of business and industry, machine-to-machine communication is commonplace. That's not to say it isn't serious either - a recent UK government report highlighted the notion of a need for a ramping up of security among connected machines.
So, who to believe? It's very difficult to know exactly how much of a threat these things are, especially because the amount of people with intelligent light bulbs in there home is so low crooks probably couldn't even DDoS your mum's laptop.
Until there's more of this stuff out there, we can't know for sure what possibilities - positive or negative - IoT can offer.
By V3's Michael Passingham, whose army of fridges is coming along nicely