Share This

Showing posts with label Cyber Security. Show all posts
Showing posts with label Cyber Security. Show all posts

Sunday, 14 May 2017

WannaCry ransomeware attacks, how to prevent it?

Source: Intel.malwaretech.com

'Do not pay ransomware hackers' - Nation


WannaCry has spread to Malaysia; two companies here were stricken by the ransomware virus that has infected a massive number of computers across the globe since Friday. Hackers use the virus to hold a victim’s data to ransom – pay up or lose all your information – and the victims overseas include hospital networks, businesses and government agencies.

PETALING JAYA: All governmental agencies have been told of the WannaCry ransomware outbreak and have armoured themselves against attacks.

“All government agencies at federal and state level have been alerted and ensured that their computers have been patched accordingly,” said CyberSecurity CEO Datuk Dr Amirudin Abdul Wahab.

Dr Amirudin said the WannaCry ransomware exploited vulnerabilities of the Windows operating system, especially on Windows XP which has stopped receiving updates since 2014.

“The malware exploits a flaw in the network protocol called the Server Message Block. Unlike former malware cases which is localised to a single computer, WannaCry exploits the operating system’s vulnerabilities and spreads it across PCs in the network.

“This is why it spread at such speed and range. Realising this, Microsoft came out with the MS17010 patch to stop this particular malware from working and spreading,” he said in a phone interview.

The patch was first rolled out in March this year but was not available to Windows XP, Windows 9 and Windows 2003 until May 12, after WannaCry’s outbreak.

According to the Microsoft Security Response Centre, Windows 10 users were not targeted by the attack.

To protect themselves against any malware attack, computer users were urged to back up their files, avoid clicking on suspicious links online or download attachments in e-mail messages sent by strangers.

“Apart from preventive measures, if you think you have been infected by the malware, please report to us at cyber999@cybersecurity.my or call us at 1300-882999,” he said.

In response to a question, Dr Amirudin said it was not an obligation under the law for anyone to report any security breach.

“It is not mandatory in Malaysia, unlike in some other countries,” he lamented, pointing out that when people made a report to CyberSecurity, their confidentiality would be paramount.

“We can also provide assistance,” Dr Amirudin added.

As of 6pm yesterday, CyberSecurity has yet to receive any report on infected computers in Malaysia.

“It does not mean that infection will not happen. At present, however, the situation is manageable and under control and we are always on the alert,” he said.

When contacted, the Malaysian Communications and Multimedia Commission and CyberSecurity Malaysia also said they had not received any report of a WannaCry infection in Malaysia.

Ransomware: how hackers take your data hostage


Screens of NHS computers with images demanding payment of US$300 (RM1,302) in Bitcoin (Bitcoin, digital currencies rally, caution prevails; virtual currency in property), saying: “Ooops, your files have been encrypted!”

It demands payment in three days or the price is doubled, and if none is received in seven days the files will be deleted, according to the screen message.

“Ransomware becomes particularly nasty when it infects institutions like hospitals, where it can put people’s lives in danger,” said Kroustek, the Avast analyst.

A hacking group called Shadow Brokers released the malware in April claiming to have discovered the flaw from the NSA, Kaspersky said.

Although Microsoft released a security patch for the flaw earlier this year, many systems have yet to be updated, researchers said.

“Unlike most other attacks, this malware is spreading primarily by direct infection from machine to machine on local networks, rather than purely by email,” said Lance Cottrell, chief scientist at the US technology group Ntrepid.

Some said the attacks highlighted the need for agencies like the NSA to disclose security flaws so they can be patched.

G7 finance ministers meeting in Italy discussed the attacks and were expected to commit to stepping up international cooperation against a growing threat to their economies. — AFP

Massive Ransomware Attack Hits 99 Countries

PHILADELPHIA (CNN)–Tens of thousands of ransomware attacks are targeting organizations around the world on Friday.

Cybersecurity firm Avast said it has tracked more than 75,000 attacks in 99 countries. It said the majority of the attacks targeted Russia, Ukraine and Taiwan.

What is it?

The ransomware locks down all the files on an infected computer and asks the computer’s administrator to pay in order to regain control of them.

The ransomware, called “WannaCry,” is spread by taking advantage of a Windows vulnerability that Microsoft released a security patch for in March. But computers and networks that haven’t updated their systems are at risk. The exploit was leaked last month as part of a trove of NSA spy tools.

“Affected machines have six hours to pay up and every few hours the ransom goes up,” said Kurt Baumgartner, the principal security researcher at security firm Kaspersky Lab. “Most folks that have paid up appear to have paid the initial $300 in the first few hours.”

Sixteen National Health Service (NHS) organizations in the UK have been hit, and some of those hospitals have canceled outpatient appointments and told people to avoid emergency departments if possible. Spanish telecom company Telefónica was also hit with the ransomware.

Spanish authorities confirmed the ransomware is spreading through the vulnerability, called “EternalBlue,” and advised people to patch.

“It is going to spread far and wide within the internal systems of organizations — this is turning into the biggest cybersecurity incident I’ve ever seen,” UK-based security architect Kevin Beaumont said.

Russia’s Interior Ministry released a statement acknowledging a ransomware attack on its computers, adding that less than 1% of computers were affected, and that the virus is now “localized.” The statement said antivirus systems are working to destroy it.

Megafon, a Russian telecommunications company, was also hit by the attack. Spokesman Petr Lidov told CNN that it affected call centers but not the company’s networks. He said the situation is now under control.

“We encourage all Americans to update your operating systems and implement vigorous cybersecurity practices at home, work, and school,” the U.S. Department of Homeland Security said in a statement released late Friday. “We are actively sharing information related to this event and stand ready to lend technical support and assistance as needed to our partners, both in the United States and internationally.”

Kaspersky Lab says although the WannaCry ransomware can infect computers even without the vulnerability, EternalBlue is “the most significant factor” in the global outbreak.

How to prevent it

Beaumont examined a sample of the ransomware used to target NHS and confirmed it was the same used to target Telefónica. He said companies can apply the patch released in March to all systems to prevent WannaCry infections. Although it won’t do any good for machines that have already been hit.

He said it’s likely the ransomware will spread to U.S. firms too. The ransomware is automatically scanning for computers it can infect whenever it loads itself onto a new machine. It can infect other computers on the same wireless network.

“It has a ‘hunter’ module, which seeks out PCs on internal networks,” Beaumont said. “So, for example, if your laptop is infected and you went to a coffee shop, it would spread to PCs at the coffee shop. From there, to other companies.”

According to Matthew Hickey, founder of the security firm Hacker House, Friday’s attack is not surprising, and it shows many organizations do not apply updates in a timely fashion. When CNNTech first reported the Microsoft vulnerabilities leaked in April, Hickey said they were the “most damaging” he’d seen in several years, and warned that businesses would be most at risk.

Consumers who have up-to-date software are protected from this ransomware. Here’s how to turn automatic updates on.

It’s not the first time hackers have used the leaked NSA tools to infect computers. Soon after the leak, hackers infected thousands of vulnerable machines with a backdoor called DOUBLEPULSAR.

Source: CNN’s Clare Sebastian contributed to this report.

WannaCry strikes two Malaysian companies



http://clips.thestar.com.my.s3.amazonaws.com/Interactive/ransomware2017/ransomware2017.mp4

PETALING JAYA: Two local companies have been hit by the infamous WannaCry ransomware, three days after the malicious software was released, infecting 200,000 computers in 150 countries so far.

According to IT security services company LGMS, the first case in Malaysia involved a director of one of its clients who came across the dreaded ransomware on his personal laptop on Saturday morning.

LGMS founder C.F. Fong said the data in the laptop had to be erased as the person did not intend to pay the US$300 (RM1,300) ransom.

The same ransomware appeared in the machine of an automotive shop on Sunday morning.

“The company didn’t have any backup and might pay (the ransom),” said Fong.

Besides disconnecting compu­ters from the network, there was not much else they could do, he noted.

As of 3pm yesterday, a website tracking incidences of WannaCry infections started showing blips in the Klang Valley area.

The website displays a blip whenever an infected computer pings its tracking servers, thus allowing it to map out a geographical distribution of the WannaCry infection.

Fong added that any machine infected by WannaCry should not be connected to a public or cor­­porate network.

“Once you plug into any network, it will start spreading,” he pointed out.

Fong said none of LGMS’ clients, which include major banks in Malaysia, had reported any pro­blems so far, adding that he was quite confident that those who re­gularly updated their computers would not face any problems with WannaCry.

He said ransomware was not new but WannaCry had caused worldwide alarm because of how fast it was spreading.

“We have seen worse and devastating ransomware attacks before but WannaCry’s infection rate is one of the fastest ever as it exploits the vulnerability that exists in Windows,” Fong said.

Security companies all over the world are reporting an unprecedented wave of WannaCry ransomware infections since Friday when more than 150 countries were hit by it.

The ransomware encrypts the data on an infected computer, preventing users from accessing it.

According to a report in The Guardian, the ransomware uses a vulnerability first revealed as part of a leaked stash of NSA-related documents, which infects machines running Windows and encrypts their contents before demanding a ransom to decrypt these files.

The perpetrators promise to release the data once a ransom of US$300 (RM1,300) is paid.

In just two days, computer networks of Britain’s National Health Service, Russia’s interior ministry and international shipper FedEx, among others, were affected.

The website tracking incidences of WannaCry infections was created by a 22-year-old British re­sear­cher known only as MalwareTech, who was credited with being an “accidental hero” after discovering a “kill switch” that halted WannaCry’s outbreak.


Cyber security expert: WannaCry ransomware has ... - The Star Online

Malaysia also hit by WannaCry ransomware - Nation

Singapore not affected by cyber attacks

How to Remove Ransomware. - Ransomware Removal Instruction

Police raid CYL office, seize items

Friday, 5 May 2017

Chinese scientists make quantum leap in computing; jumbo passenger jet C919 liftoff !

Chinese leading quantum physicist Pan Jianwei, an academician of the Chinese Academy of Sciences, and his colleagues announced they have built world's first quantum computing machine at a press conference in the Shanghai Institute for Advanced Studies of University of Science and Technology of China on Wednesday. -- People's Daily

CHINESE scientists have built the world's first quantum computing machine that goes far beyond the early classical -- or conventional -- computers, paving the way to the ultimate realization of quantum computing.

Scientists announced their achievement at a press conference in the Shanghai Institute for Advanced Studies of University of Science and Technology of China on Wednesday.

Scientists believe quantum computing could in some ways dwarf the processing power of today's supercomputers. One analogy to explain the concept of quantum computing is that it is like being able to read all the books in a library at the same time, whereas conventional computing is like having to read them one after another.

Pan Jianwei, an academician of the Chinese Academy of Sciences and a leading quantum physicist, said quantum computing exploits the fundamental quantum superposition principle to enable ultra-fast parallel calculation and simulation capabilities.

In normal silicon computer chips, data is rendered in one of two states: 0 or 1. However, in quantum computers, data could exist in both states simultaneously, holding exponentially more information.

The computing power of a quantum computer grows exponentially with the number of quantum bits that can be manipulated. This could effectively solve large-scale computation problems that are beyond the ability of current classical computers, Pan said.

For example, a quantum computer with 50 quantum bits would be more powerful in solving quantum sampling problems than today's fastest supercomputer, Sunway TaihuLight, installed in the National Supercomputing Center of China.

Due to the enormous potential of quantum computing, Europe and the United States are actively collaborating in their research. High-tech companies, such as Google, Microsoft and IBM, also have massive interests in quantum computing research.

The research team led by Pan is exploring three technical routes: systems based on single photons, ultra-cold atoms and superconducting circuits.

Recently, Pan Jianwei and his colleagues -- Lu Chaoyang and Zhu Xiaobo, of the University of Science and Technology of China, and Wang Haohua, of Zhejiang University -- set two international records in quantum control of the maximal numbers of entangled photonic quantum bits and entangled superconducting quantum bits.

Pan explained that manipulation of multi-particle entanglement is the core of quantum computing technology and has been the focus of international competition in quantum computing research.

In the photonic system, his team has achieved the first 5, 6, 8 and 10 entangled photons in the world and is at the forefront of global developments.

Pan said quantum computers could, in principle, solve certain problems faster than classical computers. Despite substantial progress in the past two decades, building quantum machines that can actually outperform classical computers in some specific tasks -- an important milestone termed "quantum supremacy" -- remains challenging.

In the quest for quantum supremacy, Boson sampling, an intermediate (that is, non-universal) quantum computer model, has received considerable attention, as it requires fewer physical resources than building universal optical quantum computers, Pan said.

Last year, Pan and Lu Chaoyang developed the world's best single photon source based on semiconductor quantum dots. Now, they are using the high-performance single photon source and electronically programmable photonic circuit to build a multi-photon quantum computing prototype to run the Boson sampling task.

The test results show the sampling rate of this prototype is at least 24,000 times faster than international counterparts, according to Pan's team.

At the same time, the prototype quantum computing machine is 10 to 100 times faster than the first electronic computer, ENIAC, and the first transistor computer, TRADIC, in running the classical algorithm, Pan said.

It is the first quantum computing machine based on single photons that goes beyond the early classical computer, and ultimately paves the way to a quantum computer that can beat classical computers. This achievement was published online in the latest issue of Nature Photonics this week.

In the superconducting quantum circuit system, a research team from Google, NASA and the University of California at Santa Barbara announced a high-precision manipulation of 9 superconducting quantum bits in 2015.

Now the Chinese team led by Pan, Zhu Xiaobo and Wang Haohua have broken that record. They independently developed a superconducting quantum circuit containing 10 superconducting quantum bits and successfully entangled the 10 quantum bits through a global quantum operation.

Chinese scientists aim to realize manipulation of 20 entangled photons by the end of this year, and will try to design and manipulate 20 superconducting quantum bits. They also plan to launch a quantum cloud computing platform by the end of this year.

Source: Xinhua

 Related post:

China successfully launched world's first quantum communication satellite 'very exciting' !


Related

It's liftoff! C919 takes to the sky on debut flight

The long-awaited China's homegrown passenger plane C919 lifts off on its maiden flight at Shanghai Pudong International Airport on Friday.

1st large Chinese-made passenger jet C919 takes flight


https://youtu.be/EEB8vKVV3HQ

Tuesday, 16 August 2016

China successfully launches world's first quantum communication satellite 'very exciting' !

https://youtu.be/XjHosmTOyUE

China launches world's first quantum communication satellite

China launched the world's first quantum-enabled satellite in the early morning hours of Tuesday, marking the first step in building a space-based quantum communications network that is virtually un-crackable.


Combined photo shows China launching the world's first quantum satellite on top of a Long March-2D rocket from the Jiuquan Satellite Launch Center in Jiuquan, northwest China's Gansu Province, Aug. 16, 2016. The world's first quantum communication satellite, which China has launched, has been given the moniker "Micius," after a fifth century B.C. Chinese scientist, the Chinese Academy of Sciences (CAS) announced Monday. (Xinhua/Jin Liwang)

WASHINGTON, Aug. 15 -- China's successful launch of the world's first quantum satellite was "very exciting" and can help conduct experiments that may lead to "much more secure" quantum communications, a U.S. quantum expert said.

"The event is indeed very exciting and does carry global importance because this would be the first such experiment," said Alexander Sergienko, a professor of electrical and computer engineering at the Boston University.

The satellite, Quantum Experiments at Space Scale (QUESS), lifted off from China's Jiuquan Satellite Launch Center at 1:40 a.m. Tuesday, local time.

Sergienko said the quantum communication race has been going on for the last 20 years since the initial demonstration of quantum key distribution link under Lake Geneva in 1995.

After that, metropolitan secure communication networks have been developed and demonstrated in Boston, Vienna, Beijing, and Tokyo, and many more examples of quantum metropolitan networks have been demonstrated in the last five years covering Canada, Italy, U.K. and Australia, he said.

"The race is now moving in the near space in order to cover longer distances between different metropolitan areas," he said.

"I know there were plans to develop multiple point-by-point multi-city quantum communication segments to cover the distance between Shanghai and Beijing. A successful implementation of the satellite project would allow covering it in one step."

Sergienko also predicted that quantum communication and cryptography will be first used to ensure the most important communication lines such as used by the government and by major business in their communication.

China said the 600-plus-kilogram QUESS, nicknamed "Micius," is expected to circle the Earth once every 90 minutes after it enters a sun-synchronous orbit at an altitude of 500 kilometers.

In its two-year mission, QUESS is designed to establish "hack-proof" quantum communications by transmitting uncrackable keys from space to the ground, and provide insights into the strangest phenomenon in quantum physics -- quantum entanglement.

China launches first-ever quantum communication satellite


China launches the world's first quantum satellite on top of a Long March-2D rocket from the Jiuquan Satellite Launch Center in Jiuquan, northwest China's Gansu Province, Aug. 16, 2016. The world's first quantum communication satellite, which China is preparing to launch, has been given the moniker "Micius," after a fifth century B.C. Chinese scientist, the Chinese Academy of Sciences (CAS) announced Monday. (Xinhua/Jin Liwang)

China successfully launched the world's first quantum satellite from the Jiuquan Satellite Launch Center in northwestern Gobi Desert at 1:40 am on Tuesday.

In a cloud of thick smoke, the satellite, Quantum Experiments at Space Scale (QUESS), roared into the dark sky on top of a Long March-2D rocket.

The 600-plus-kilogram satellite will circle the Earth once every 90 minutes after it enters a sun-synchronous orbit at an altitude of 500 kilometers.

It is nicknamed "Micius," after a fifth century B.C. Chinese philosopher and scientist who has been credited as the first one in human history conducting optical experiments.

In its two-year mission, QUESS is designed to establish "hack-proof" quantum communications by transmitting uncrackable keys from space to the ground, and provide insights into the strangest phenomenon in quantum physics -- quantum entanglement.

Quantum communication boasts ultra-high security as a quantum photon can neither be separated nor duplicated. It is hence impossible to wiretap, intercept or crack the information transmitted through it.

With the help of the new satellite, scientists will be able to test quantum key distribution between the satellite and ground stations, and conduct secure quantum communications between Beijing and Xinjiang's Urumqi. QUESS, as planned, will also beam entangled photons to two earth stations, 1,200 kilometers apart, in a move to test quantum entanglement over a greater distance, as well as test quantum teleportation between a ground station in Ali, Tibet, and itself.

"The newly-launched satellite marks a transition in China's role -- from a follower in classic information technology (IT) development to one of the leaders guiding future IT achievements," said Pan Jianwei, chief scientist of QUESS project with the Chinese Academy of Sciences (CAS).

The scientists now are expecting quantum communications to fundamentally change human development in the next two or three decades, as there are enormous prospects for applying the new generation of communication in fields like defense, military and finance. SPOOKY & ENTANGLED

Quantum physics is the study of the basic building blocks of the world at a scale smaller than atoms. These tiny particles behave in a way that could overturn assumptions of how the world works.

One of the strange properties of quantum physics is that a tiny particle acts as if it's simultaneously in two locations -- a phenomenon known as "superposition." The noted interpretation is the thought experiment of Schrodinger's cat -- a scenario that presents a cat that may be simultaneously both alive and dead.

If that doesn't sound strange enough, quantum physics has another phenomenon which is so confounded that Albert Einstein described as "spooky action at a distance" in 1948.

Scientists found that when two entangled particles are separated, one particle can somehow affect the action of the far-off twin at a speed faster than light.

Scientists liken it to two pieces of paper that are distant from each other: if you write on one, the other immediately shows your writing.

In the quantum entanglement theory, this bizarre connection can happen even when the two particles are separated by the galaxy.

By harnessing quantum entanglement, the quantum key technology is used in quantum communications, ruling out the possibility of wiretapping and perfectly securing the communication.

A quantum key is formed by a string of random numbers generated between two communicating users to encode information. Once intercepted or measured, the quantum state of the key will change, and the information being intercepted will self-destruct.

According to Pan, scientists also plan to test quantum key distribution between QUESS and ground stations in Austria. Italy, Germany and Canada, as they have expressed willingness to cooperate with China in future development of quantum satellite constellations, said Pan. LIFE CHANGING

With the development of quantum technology, quantum mechanics will change our lives in many ways. In addition to quantum communications, there are quantum computers that have also drawn attentions from scientists and governments worldwide.

Quantum computing could dwarf the processing power of today's supercomputers.

In normal silicon computer chips, data is rendered in one of two states: 0 or 1. However, in quantum computers, data could exist in both states simultaneously, holding exponentially more information.

One analogy to explain the concept of quantum computing is that it is like being able to read all the books in a library at the same time, whereas conventional computing is like having to read them one after another.

Scientists say that a quantum computer will take just 0.01 second to deal with a problem that costs Tianhe-2, one of the most powerful supercomputers in the world, 100 years to solve.

Many, however, is viewing this superpower as a threat: if large-scale quantum computers are ever built, they will be able to crack all existing information encryption systems, creating an enormous security headache one day.

Therefore, quantum communications will be needed to act like a "shield," protecting information from the "spear" of quantum computers, offering the new generation of cryptography that can be neither wiretapped nor decoded. GOING GLOBAL?

With the launch of QUESS, Chinese scientists now are having their eyes on a ground-to-satellite quantum communication system, which will enable global scale quantum communications.

In past experiments, quantum communications could only be achieved in a short range, as quantum information, in principle, could travel no more than 500 kilometers through optical fibers on the land due to the loss of photons in transmission, Pan explained.

Since photons carrying information barely get scattered or absorbed when travelling through space and Earth's atmosphere, said Pan, transmitting photons between the satellite and ground stations will greatly broaden quantum communications'reach.

However, in quantum communications, an accurate transmission of photons between the "server" and the "receiver" is never easy to make, as the optic axis of the satellite must point precisely toward those of the telescopes in ground stations, said Zhu Zhencai, QUESS chief designer.

It requires an alignment system of the quantum satellite that is 10 times as accurate as that of an ordinary one and the detector on the ground can only catch one in every one million entangled photons fired, the scientist added.

What makes it much harder is that, at a speed of eight kilometers per second, the satellite flying over the earth could be continuously tracked by the ground station for merely a few minutes, scientists say.

"It will be like tossing a coin from a plane at 100,000 meters above the sea level exactly into the slot of a rotating piggy bank," said Wang Jianyu, QUESS project's chief commander.

Given the high sensitivity of QUESS, people could observe a match being lit on the moon from the Earth, Wang added.

After years of experimenting, Chinese scientists developed the world' s first-ever quantum satellite without any available reference to previous projects. Now they are waiting to see QUESS's performance in operation.

According to Pan, his team has planned to initiate new projects involving research on quantum control and light transmission in space station, as well as tests on quantum communications between satellites, all-time quantum communications and the application of quantum key network.

"If China is going to send more quantum communication satellites into orbit, we can expect a global network of quantum communications to be set up around 2030," said Pan. - Xinhuanet

Image for the news resultRelated:

Quantum satellite: China successfully launches its first
NEWS.com.au -China takes major step in creating a global network for quantum communication. August 16 2016

Related posts:


May 30, 2016 ... Scientists are making final adjustments to China's first quantum communication satellite. The project chief describes it as a revolution in ...
Quantum Computing Thrives on Chaos
Mar 12, 2010 ... Embracing chaos just might help physicists build a quantum brain. ..... A Long March-7 carrier rocket lifts off from Wenchang Satellite Launch ...
China's new generation carrier rocket blasts off in Hainan ...
Jun 26, 2016 ... A Long March-7 carrier rocket lifts off from Wenchang Satellite Launch Center, south China's Hainan Province, June 25, 2016. [Photo: Xinhua/Li ...

China to launch second space lab Tiangong-2 in SeptemberChina to launch second space lab Tiangong-2 in September  2016
China will send its second orbiting space lab Tiangong-2 into space in mid September, said a senior official with manned space program.

DBS, the Beidou Navigation Satellite System from China
Jun 17, 2016 ... In 2020, the BDS might offer different positioning accuracy choices and could ... China space station will be completed by 2020, the super "eye".
 
Mar 1, 2016 ... China space station will be completed by 2020, the super "eye" to speed up space rendezvous ... The "eye" is China's newly developed third-generation rendezvous and docking CCD optical imaging sensor. It will be used on China's ... China's Space Age Grows Up As U.S. Space Race ..

Friday, 15 January 2016

Internet set to cut cord with US government, ICANN urges Internet control



The US government, announcing its intention to end its role in March 2014, said it would seek to maintain a "multi-stakeholder" model for Internet governance

A plan to end a key US government oversight role on the Internet is on track for completion this year, the head of the online address gatekeeper said, in a symbolic move towards asserting the independence of the web.

While the transition will not change how the Internet works, it would help reassure users, businesses and governments about its integrity, according to Fadi Chehade, chief executive of the Internet Corporation for Assigned Names and Numbers (ICANN).

Chehade told AFP the transition plan being prepared since early 2014 will be delivered to the US government in February, and that it could take place on September 30—a year later than originally planned.

If the US government approves the plan, "then the contract between ICANN and the US government which is set to naturally expire on September 30 will just expire," Chehade said in an interview Wednesday in Washington.

Chehade said the private non-profit ICANN is effectively a "traffic cop" that ensures the Internet address system functions, and that the US government's role has been merely to ensure that it follows correct procedures.

"In all the years we've done that (the US government) has never said we did not follow the process," he said.

"People have aggrandized the role of the US government in what we do. But the change is actually minimal. It's important symbolically because the US was really a steward for the Internet, but for day-to-day accountability, it is minimal."

Who runs the Internet?

The US government, announcing its intention to end its role in March 2014, said it would seek to maintain a "multi-stakeholder" model for Internet governance—which allows virtually all users from business to academia to government to participate—instead of a "multilateral" system controlled by governments.

Chehade said that without US oversight, ICANN would be managing the technical functions of the Internet under the supervision of a 16-member board which is designed to maintain diverse representation.

"We have a very solid process that ensures this is not a capturable board," which can be hijacked by governments or other institutions, he said.

He added that the transition plan seeks "to strengthen the assurances that ICANN will remain multi-stakeholder," by giving Internet users more authority to appeal to overturn decisions or even to remove board members.

Chehade noted that even though the ICANN process can be "unwieldy," most decisions are made by consensus, with very few disputed votes in the organization.

He added that he expects a fresh round of hearings in Congress, following complaints by some US lawmakers that Washington is "giving away" the Internet and suggestions that it could be controlled by other governments.

"I think the concerns Congress has raised are very justified and genuine and therefore being prepared to address them is crucial," he said.

But Chehade noted that ICANN has effectively been handling its functions for a long time.

"The independence of ICANN has been proven to be working for many years," he said.

"It's been working and we are now simply admitting that. We are ending the symbolic role of the US government which should have been let go in 2000."

ICANN chief urges wide Internet control

 
Internet Corporation for Assigned Names and Numbers (ICANN) President and CEO Fadi Chehadé called for the "preservation of a decentralised, transnational and not too fragmented governance" of the Internet on Tuesday

The head of the private agency that acts as gatekeeper for the Internet called Tuesday for international discussions to ensure control of the web remains decentralised.

Fadi Chehade, president and CEO of the Internet Corporation for Assigned Names and Numbers (ICANN), called for the "preservation of a decentralised, transnational and not too fragmented governance" of the Internet.

He told a Geneva conference that the Internet should remain "polycentric" but that the private and public sectors should work together.

"Only initiatives involving the private sector and governments can successfully and effectively address crucial issues like cybercrime, taxation of e-commerce, and child protection," Chehade said.

ICANN, which is in charge of assigning domain names, is likely to break free of US oversight late next year.

Washington said in March it might not renew its contract with the Los Angeles-based agency, provided a new oversight system is in place that ensures the Internet addressing structure is reliable.

"ICANN is not and shall not be an island disconnected from other stakeholders," Chehade said.

The agency plans to submit a proposal on oversight to the US Department of Commerce next year.

In an interview published Tuesday in Swiss daily Le Temps, Chehade said the role of the United States—one of ICANN's 147 member countries—would remain important.

"If our DNA remains American, our openness to the world is a reality."

US Commerce Secretary Penny Pritzker pledged at a meeting of Internet leaders in October that the United States would "protect and preserve a free, vibrant and open Internet".

Pritzker said that while the United States might not renew its contract with ICANN, it still had a responsibility to encourage a decentralised Internet.

"The United States will not allow the global Internet to be co-opted by any person, entity, or nation seeking to substitute their parochial world view for the collective wisdom of this community," she said. - AFP

Related posts:


Dec 16, 2015 ... Chinese President Xi Jinping began to deliver a keynote speech at the opening ceremony of the Second World Internet Conference (WIC) held ...


Dec 10, 2015 ... Chinese President Xi Jinping will attend the upcoming Second World Internet Conference (WIC) in the river town of Wuzhen in east China's ...
 
Sick gamers on the rise !
Parents seek help for addicted kids Experts: Too much gaming has more serious effects than most people realise For many Malaysians, i...
IT is 10pm and you know exactly where your children are. They are at home with you, and the last time you looked, they were on their 

Wednesday, 16 December 2015

World Internet Conference 2015 Live from Wuzhen, China



Video: President Xi Jinping delivers keynote speech at WIC

Chinese President Xi Jinping began to deliver a keynote speech at the opening ceremony of the Second World Internet Conference (WIC) held in the river town of Wuzhen in east China's Zhejiang Province Wednesday.



http://english.cntv.cn/2015/12/16/VIDE1450236360367156.shtml



Xi calls for: No double standards in cyber security, cyber sovereignty, inclusive Internet community to build shared cyber future

WUZHEN, Zhejiang, Dec. 16 (Xinhua) -- Chinese President Xi Jinping on Wednesday called for joint efforts to combat cyber crimes and Internet terrorism, while underscoring that there should not be any double standards in safeguarding cyber security.

"We can not just have security for one or some countries, leaving the rest insecure, still less should one seek the so-called absolute security of itself at the expense of security of others," Xi said in a keynote speech at the opening ceremony of the Second World Internet Conference held in the river town of Wuzhen, east China's Zhejiang.

Cyberspace is for all mankind. Its future should be in the hands of all nations and countries should step up communication, broaden consensus and deepen cooperation, the Chinese president said.

Xi Jinping has put forward five proposals to build a community of shared future in cyberspace.

Speaking at a government-organised conference in Wuzhen Town attended by executives of global and Chinese Internet companies, he called for efforts to speed up the building of global cyber infrastructure and promote connectivity.

“China stands ready to work with all parties concerned to come up with more investment and technical support to jointly advance the building of global cyber infrastructure and enable more developing countries and their people to share the development opportunities brought by the Internet,” Xi said.

China's President Xi Jinping laid out his vision for the internet, calling for respect of different governance models and standardized online security, placing China at the front of debates on online control and sovereignty.
"Each country should join hands and together curb the abuse of information technology, oppose network surveillance and hacking, and fight against a cyberspace arms race," Xi told China's second World Internet Conference.
Major Internet players such as Facebook, Microsoft, and China's Alibaba attended the conference.

Participants hail President Xi's remarks at WIC

Participants hail President Xi's remarks at WIC.




Commentary: "Shared and governed by all" only way for Internet to get out of "Hobbes Jungle"


BEIJING, Dec. 16 (Xinhua) -- Twenty-eight years ago, the founding father of the German Internet Dr. Werner Zorn helped Beijing send its first email to the outside world, which said: "Across the Great Wall we can reach every corner in the world."

However, today, China, together with other developing countries, still find themselves trapped in a jungle due to an expanding digital divide and a lack of joint governance.

The divide, a technological gap between developing and developed countries on an international scale, is mainly caused by some Western countries' arrogance and monopoly of information and communication technologies.

For example, the central nervous system of the global Internet with 13 root severs is completely dominated by the West, with the United States having 10 root severs while Britain, Sweden and Japan possess one respectively.

The ever-enlarging gap is detrimental to the stability and sustainable development of the international community, leading to anarchy in cyberspace and to some extent, gradually transforming it into a Hobbes Jungle where the stronger always has a bigger say over the destiny of smaller ones.

In addition, the divide has begun to show side effects like cybercrimes or even cyberterrorism as it accelerates social inequality, which provides fertile ground for extremism.

Like China, the United States is also a victim of cyberanarchy and such side effects. The recent shooting rampage in southern California, where two attackers radicalized by fanatical propaganda of the Islamic State (IS) on the Internet opened fire on innocent people, has sent a strong signal to Uncle Sam and its Western allies that they need to share and govern cyberspace with others.

After all, the Law of Jungle is relentlessly fair to everyone. In the long run, it neither favors the United States for its preponderance nor discriminates against the IS for its extremism.

In this sense, the opening of the Second World Internet Conference on Wednesday in China's Wuzhen with the theme of "an interconnected world shared and governed by all -- building a community of common future in cyberspace", is a boon to nations worldwide threatened by the Law of Jungle.

If they want to get out of the jungle, they should bear three things in mind.

First, teamwork. Treat each other with respect and equality. The jungle is too enormous for egoism. Selfishness and hegemony worship will only ruin the mission. So the hefty ones like the United States should learn to cooperate if they want to defeat common enemies like cybercrimes.

Second, sharing. Don't let the smaller ones be knocked out. Help them grow. Otherwise, they will become accomplices of the jungle. The Western countries who enjoy early advantages of information technology should loosen their restriction on technology transfers to developing countries.

Thirdly, joint governance. Never seek hegemony in decision-making. There are many paths to leave the jungle and the one you choose may not suit others. The governance of cyberspace needs the participation of all parties and all voices should be heard before a final decision is made.

By Tian Dongdong Xinhua

Cyber security depends on US cooperation
US President Barack Obama delivers remarks next to Secretary of Homeland Security Jeh Johnson (L) at the National Cybersecurity and Communications Integration Center in Arlington, Virginia, January 13, 2015. [Photo/Agencies]

China's attempts to cooperate with the United States to safeguard the strategic stability of cyberspace have been welcomed, as the Chinese mainland and Hong Kong have suffered a series of high-profile cyber attacks this year, according to the latest PricewaterhouseCoopers Global State of Information Security Survey. The average financial loss caused by cyber-crimes in the region, says the report, rose 10 percent year-on-year to $2.63 million, compared with a 5 percent decline globally.

In cooperating to safeguard cyberspace, Beijing and Washington could seek the Internet equivalent of the code of safe conduct agreed between their militaries to avoid naval and air encounters, which has helped manage several bilateral disputes.

The two countries should first try their best to not point the finger at each other in case a conflict over cyber security emerges. The latest round of tensions in cyberspace started in early 2013, when American private security company Mandiant released a report, "APT1: Exposing One of China's Cyber Espionage Units", accusing the Chinese military of stealing US intellectual property.

Such a hysterical attitude, to a point, reflects the US' anxiety over China's impressive economic growth in the recent years. It is, therefore, important that the US seek to adjust its strategic perception of China and accept that the power gap between them is closing.

Beijing, on its part, ought to make more efforts to make its ideas clear to acquire a bigger say in global cyber-security affairs. Besides, neither country, especially the US, should make a habit of "making enemies" by taking irresponsible actions, even for the sake of national security.

True, most cutting-edge technologies in the age of the Internet can be lawfully and strategically used to gather military intelligence and keep cyber attacks at bay. But highly politicized discussions and operations, which used to be kept secret, can now be made public by the media today. So the challenge is to keep such details confidential.

In regard to China-US cyber cooperation, the major problem lies in Washington's attempts to create enemies for political motives. Tactics such as exaggerating the perils of the so-called Chinese cyber-attacks and intimidating the American public and legislature with some selectively chosen materials, for example, have been routinely used by the US cyber-security authorities to create more room for political maneuverings and get more military budget.

Such tricks may have eased some of their pressure to safeguard homeland security, but they have come at the cost of cyberspace stability which China and the US both need. They have also failed to protect the two countries' national interests, which need them to closely coordinate rather than oppose or accuse each other.

Washington should also be careful about its military industry, which is basically bolstered by certain security enterprises and departments trying to abduct the national security policy.

For some US security companies, gathering evidence on the imaginary cyber-attacks from China to help thwart them in the future can guarantee the consistent increase in their market values. Likewise, relevant governmental organs also tend to overstate the cyber security issue to increase their budget and influence security affairs.

China and the US should not let such parochial and hawkish mindset affect Washington's cyber-security strategy, because neither country can emerge as winner in a cyber war; in fact, such a war will cause huge damage to the world. As a responsible major power, the US is obliged to push forward the China-US strategic dialogue on cyber security to make global cyberspace more stable, rather than using double standard to defend its controversial strategy and tactics, and condemn China for absurd reasons.

By Shen Yi (China Daily)
The author is an associate professor in the Department of International Politics at Fudan University in Shanghai.

China key to turning cyberspace truly global
A visitor tries out wearable device at the Light of the Internet Expo in Wuzhen, Zhejiang province, Dec 14, 2015. [Photo /chinadaily.com.cn]

China holds a pivotal role in the Internet. It had more than 650 million Internet users by the end of last year and it is the largest and fastest growing information and communications technology consumer market in the world. The Chinese ICT sector is currently valued at €433 billion ($477.472 billion) and it is growing at an annual average rate of 7 percent, the fastest in the world. The country has made tremendous progress in Internet development in the past decade having become the most active e-commerce market in the world.

However, if we look at the distribution of the world's ICT sector, China does not rank first. It ranks third. In 2012 China accounted for 13 percent of the world's ICT, behind the United States (32 percent) and the European Union (23 percent). In the same year, the value of the EU's ICT sector exceeded €516 billion.

These figures show the tremendous growth opportunities of China's ICT industry. Obviously, the strategy should not be just to copy leading brands or seek to produce "Chinese" products. The ICT industry is not the car industry. It doesn't just produce a series of final products; it produces interconnected systems too. In the ICT industry, we cannot innovate in isolation. Each single new product or system needs to be compatible — to interoperate — with those of upstream service providers and of the applications that users want.

Even more than in other globalized industries, the keyword in ICT is specialization. In other words, China should not promote investments in areas where other countries or economies are strong, but seek cooperation instead. In this regard, an analysis of the ICT statistics of China and the EU show how complementary China's and Europe's ICT sectors are.

China is very strong in manufacturing — more than 50 percent of the ICT sector comprises the manufacturing of telecom equipment, consumer electronics and electronic components. The EU instead dominates in high-end innovative services and IT applications, which together account for more than 55 percent of regional ICT sector.

The EU is a major technology hub and it can provide a key contribution for the growth of new ICT markets in China if adequate cooperation agreements are timely discussed and concluded, for example, in niche markets like the Internet of Things, smart cities, big data, e-health, cloud services, which will drive growth in the ICT industry in the next decade.

But opportunities for cooperation also exist in the "traditional" telecom segment. China and the EU are home to the world's major telecom vendors. Synergies in 5G development are clear, especially following the signing of the EU-China Agreement on 5G last September in Beijing.

The EU-China political and economic relationship is very developed, though there are some challenges, which we need to overcome to improve cooperation in the digital field, such as the lack of mutual understanding of the reciprocal markets, divergences in the approach to cyber security and, related to it, a lack of global Internet confidence. Moreover there are substantial regulatory divergences between the Chinese and EU rules, for example, on consumer protection and data protection.

The EU has just started its ambitious "Digital Single Market" strategy, which should in the coming years reduce barriers to doing business across the EU's internal borders, provide EU companies scale and resources to grow and make the EU an even more attractive location for global companies.

The EU's Digital Single Market strategy will offer substantial investment opportunities to Chinese ICT companies.

However, in the global Internet ecosystem, the concept of attracting investment by making one's investment conditions more attractive than those in competing economies is outdated. We need a global single, open cyberspace.

The second World Internet Conference in Wuzhen, Zhejiang province, could be the starting point of discussions between China and the EU, for instance, on how to facilitate online purchases of digital contents and to promote affordable high quality parcel delivery. Obviously, at a later stage anecdotal evidence should be complemented thorough academic study of respective Internet regulations in China and the EU.

By Luigi Gambardella (China Daily)
The author is president of ChinaEU, a non-profit platform aiming to boost bilateral digital cooperation.

Related:

Wuzhen showcases China’s Net prosperity

If we all apply the rules of the US, many societies could not afford the consequences.
Source: Global Times | 2015-12-16 0:48:01

Aerial view of Wuzhen, venue for World Internet Conference

Wuzhen World Internet Conference 2015


Related post
  World Internet Conference to be held Dec 16~18 2015 Wuzhen China
Chinese President Xi Jinping will attend the upcoming Second World Internet Conference (WIC) in the river town of Wuzhen in east China ...