Risks of AI
In 1956, at a workshop on the campus of Dartmouth College, in Hanover, New Hampshire, the field of artificial intelligence (AI) was born. Attendants were buoyant. MIT cognitive scientist Marvin Minsky was quoted as saying, "Within a generation  the problem of creating 'artificial intelligence' will substantially be solved." This prediction turned out to be over zealous, but Minsky and his colleagues believed it wholeheartedly. What, then, is different today? What makes the current dialogue about AI more relevant and believable? How do we know that this is not another case of humans over estimating the development of technology? For one thing,...
AI and 5G
In 2013, George F. Young and colleagues completed a fascinating study into the science behind starling murmurations. These breathtaking displays of thousands – sometimes hundreds of thousands – of birds in a single flock swooping and diving around each other, look from a distance like a single organism organically shape-shifting before the viewer’s eyes. In their research article, Young et al reference the starling’s remarkable ability to “maintain cohesion as a group in highly uncertain environments and with limited, noisy information." The team discovered that the birds’ secret lay in paying attention to a fixed number of their neighbors –...
Smart City Chip
Technologies that could change the world have been a popular topic for the past half century. True, the predictions that everyone would drive flying cars have not materialized, but what has materialized would astound those who offered such predictions 50 years ago. And where emerging technologies are headed is even more stunning. Seven technologies, in my opinion, are poised for explosive growth in 2019. And what they can accomplish this year and beyond is not even the most significant disruption that I see them causing. But I’ll get to that later. First, let’s look at the Significant Seven. Internet of Things...
AI Cybersecurity Battlefield
Cybersecurity strategies need to change in order to address the new issues that Machine Learning (ML) and Artificial Intelligence (AI) bring into the equation. Although those issues have not yet reached crisis stage, signs are clear that they will need to be addressed – and soon – if cyberattackers are to be prevented from obtaining a decided advantage in the continuing arms race between hackers and those who keep organizations’ systems secure. ML and AI can magnify existing vulnerabilities and open the door to new attack strategies. At the same time, though, they offer new tools to help organizations secure...
Innovation in Canada
Canada’s rankings in innovation has lagged that of other peer nations for decades despite government efforts to address this issue. Considering its success in developing research programs at its universities, its mediocre rankings overall in technology development is disappointing. Those programs alone have not been enough to translate into entrepreneurial innovation. A 2017 C.D. Howe Institute study points out that, even though Canadians have been at the forefront of breakthroughs in emerging technologies, in many cases, the chief beneficiaries of those breakthroughs have been other nations’ economies. Canada needs to take a stronger role in building an environment in which...
Chinese cybercrime
Western publications often picture the People’s Democratic Republic of China (hereafter China) as the world’s chief propagator of cyberattacks. But the picture is much more complex than such broad-brush claims suggest. Few Westerners realize that China and its neighbours in the Greater China region (Taiwan, Macau and Hong Kong) have, over last few years, became the most technologically advanced region in the world – ahead of the West in the adoption, and in many cases even in the development of advanced technologies. Countries in the region were always close to the top of the list of victims of cyberattacks. Factors, such...
Cyber-Kinetic Robot
The attacker stepped out from behind a hedge in the upper-class suburban neighborhood, being careful to stay in the shadows. Across the street, the last lights shining through the windows of the house had just flickered out. She tugged the bottom of her black hoodie into place and pulled the hood up over her head, casting her face deeper in shadow. Her target sat in the driveway at the front of the house, a bright red and completely decked out SUV. Glancing up and down the street to ensure no one was looking, she slipped across the street into the...
Security Standards Regulations Guidelines
Below is my attempt to list of all published 5G, IoT and "Smart Everything"-related security guidelines, frameworks and standards. If you are aware of additional entries that should be here, please let us know at info@5g.security