SlideShare una empresa de Scribd logo
1 de 33
Descargar para leer sin conexión
There is a Price and a Risk For Every Advancement. Are We Willing
to Sacrifice Our Privacy for Global Connectedness and Convenience?
Robin M. Austin © October 2018
The IoT Battlefield
Cyber Defense Resources
The Top 10 IoT Segments in 2018
– based on 1,600 real IoT projects
Source: IoT Analytics, The Top 10 IoT Segments in 2018 – based on 1,600 real IoT projects.
Cyber Defense Resources
IoT Analytics
THERE IS A DISCONNECT:
FAILURE Security Strategy For IoT Deployments
When Asked These Are the Top Concerns
Cyber Defense Resources
TRUTH IS HARD TO SWALLOW
• Businesses Cyber breaches almost doubled in 5 yrs.
– from 68 per business in 2012
– to 130 per business in 2017
– 36 stopped by law enforcement successes in 2010–2012
• Resurgence: “dark net” markets for malware goods &
services
– 37 in 2016 alone
– 357 million new malware variants were released
• “banking trojans” designed to steal account login details
could be purchased for as little as US$500.38
• Cyber criminals have an exponentially increasing number
of potential targets, because the use of cloud services and
IoT devices
Cyber Defense Resources
2016 Bug Bounty Hacker Report Seen a Success
• April 2016: U.S. FEDs launched Department of Defense’s Hack
• Shortly after: Pentagon followed with U.S. Army, U.S. Air Force & GSA
• May 2017: Technology Transformation Service (GSA) and IRS
• Next: U.S. Senators introduced Fed. Bug Bounty Program for DHS
• Followed by: U.K. announced a vulnerability disclosure policy pilot
• Next: DOJ quietly released guidelines so you can design your own
software vulnerability disclosure programs
– To avoid legal issues traditionally caused when a hacker remotely accesses
a computer system without prior consent
– Because confidential information on internal “bugs” affecting a
company’s own systems or products can complicate Computer
Fraud and Abuse Act, or CFAA, which has been applied in different
court cases in a variety of conflicting ways.
BUGemot
Cyber Defense Resources
HackerOne
Since 2013, over 800 programs have launched
ABOUT HACKERONE:
• #1 bug bounty vulnerability disclosure platform
• Largest community of ethical hackers
• Collectively paying out $17 million in cash
• 50,000 security vulnerabilities fixed & rendered
unexploitable
Cyber Defense Resources
IoT TOP PATENT HOLDERS:
Samsung, Qualcomm, LG, Huawei, and Intel
Cyber Defense Resources
Cyber Defense Resources
Global Embedded Security
IoT “CHIP” Security Challenges
1. Gaps in technical sophistication
2. Standards are absent or immature
3. Customers view IoT security as a commodity
4. Semiconductor companies struggle to profit from security
Cyber Defense Resources
Who Will Develop Security for IoT
Cyber Defense Resources
What makes each IoT device special is also
what makes it vulnerable. They are tiny,
and normally only possess enough
intelligence to perform a single function.
That’s why they can fit almost anywhere.
But unfortunately, given our current
technology, that does not leave a lot of
room for things like memory, processors or
any good way to increase computing power.
If you try to add power to an IoT device,
you end up also increasing its size, power
requirements, heat generation and other
factors. At some point, it’s no longer an IoT
device, and can’t perform its role as one.
Because of size and processor constraints,
most IoT devices have no security at all.
Others like web cameras ship with basic
password protection, which is better than
nothing, but then users forget to change
the default passwords, leaving the device
vulnerable to a simple attack.
I have recently reviewed IoT programs that
are designed to protect IoT by installing
them behind a dedicated frontend system.
Manufacturers have little interest in adding
native security. Home users won’t have
access to enterprise-level cybersecurity
platforms.
The National Institute of Standards and Technology believes it has the answer
and is trying to work with industry and even individuals to develop standards
for lightweight encryption. This is a project that NIST began quite some time
ago, back in 2013 to be exact. But it has taken this long, and several workshops,
to get the Lightweight Cryptographic Project to a point where we can almost
start deploying the kinds of protection that IoT needs, and that we need from
our IoT.
Cyber Defense Resources
The list price for a new Tesla Powerwall 2.0 battery,
which offers twice the storage capacity of the original
Powerwall, is $5,900. Supporting hardware adds
another $700 to the equipment costs, bringing the
total to $6,600. Installation can add anywhere from
$2,000 to $8,000 to the final bill.
Distributed
Battery
Storage Will
Surpass
Grid-Scale
Storage in
the US by
2020
Cyber Defense Resources
A Thai-based
renewable energy
technology company,
Energy Absolute, plans
to invest $3 billion in
battery gigafactory.
The plant is expected to
be larger than Japanese
electronics maker
Panasonic's 35GWh
factory for US electric
car maker Tesla in the
state of Nevada.
Energy Absolute also
plans to set up 1,000
charging stations for
electric cars in Bangkok
and elsewhere by the
end of the year, before
moving to the battery
market.
Cyber Defense Resources
TECHNOLOGY RENEWABLE
ENERGY INVESTMENT
The Hidden Cost of the Electric Car Boom – Child Labor
Some of the most significant developments in the electric car market are likely to come from China, where the
market for electric vehicles grew by 72% last year, with 94% of that market owned by domestic manufacturers. Car
ownership rates less than a quarter of those in Europe, the demand for electric vehicles in China looks set to explode.
A critical raw material in lithium-ion battery production, cobalt is in high demand. It is needed to power
smartphones, tablets, and laptops as well as electric vehicles, but it is the latter where astronomical growth risks
perpetuating misery. Dangerous working conditions, risks to people’s health, and child labor is a huge problem in the
cobalt mines of the Democratic Republic of the Congo (DRC).
Two-thirds of the world’s cobalt is found in the DRC, which is one of the world’s poorest and least
developed countries with a gross national income per capita of just $481.
Cyber Defense Resources
43 Battery Storage Companies To Watch
• ABB: One of the largest power and automation companies in the world, and focused on cleantech. It offers
distributed energy storage modules for grid storage purposes, such as peak shaving, load shifting voltage
regulation, renewable integration, and backup power.
• AESC: Automotive Energy Supply Corporation is one of three “leaders” in the electric vehicle (EV) battery
space, according to a Navigant Research report on the market. Being in the EV battery space, it (naturally)
produces lithium-ion batteries, using lithium manganate as the cathode.
• AES Energy Storage: Although AES has been in the energy business for 30 years, this certainly doesn’t mean
that they aren’t worth keeping an eye on for the upcoming year. This market leader has the largest fleet of
grid batteries in commercial service and received a notable award in November 2014 of a 20-year contract
with Southern California Edison of 100 MW of interconnected battery energy storage. AES partners with
industry-leading utilities and power system operators on energy storage projects.
• Alevo: popped out of a long stealth mode in 2014 and is bringing the “first inorganic lithium battery” to the
commercial market. It’s near the top of the list here thanks to the alphabet and choice of name, but it’s also
one of the most promising-looking companies on the list, imho. It is targeted at the grid storage market.
• Ambri: Spun out of MIT and developing liquid metal battery technology for the past few years. It has an initial
factory in place.The batteries are targeted for stationary storage applications.
• Amprius: develops high-capacity lithium-ion batteries that originated at Stanford University. Investors
include Trident Capital, VantagePoint Capital Partners, IPV Capital, Kleiner Perkins Caufield & Byers, SAIF
Partners, Chinergy Capital, Google Chairman Eric Schmidt, and Stanford University. Former Secretary of
Energy Steven Chu sits on the board.
• Aquion Energy: Aqueous hybrid ion battery technology boasts “long cycle life at 100% depth of discharge for
long duration (4 to 20 hour) applications.”
• Bosch: It may not be Bosch’s signature product, but the technology giant is offering energy storage and
related technology and service solutions, particularly in connection with solar and wind power installations.
Cyber Defense Resources
In 2017 Samsung Electronics’
technology institute, Samsung
Advanced Institute of Technology
(SAIT), had developed a core battery
technology which used graphene to
deliver longer operating times and
faster charging. The graphene ‘balls’
are said to boost battery capacity by
45%, whilst making the rate at which
the battery charges five times faster
than current standards
A university in CHINA nanopolymer
laboratory reported that after 250,000
instances of charging, the graphene-
based battery retained 91% of its
capacity, as well as remaining stable
under extreme temperatures
Cyber Defense Resources
Samsung, appears to have discovered
the holy grail of commercial graphene
production:
• BlackBerry is back with Cloud-based Security Platform for IoT (01/2015)
– Collaboration platform for application developers & business partners initially for
automotive sector soon to extend to energy and healthcare.
– Blockchain Smartphone
Cyber Defense Resources
A Need for Due Diligence
• The recent hype to raise funds for blockchain projects
brought charlatans with fraudulent intentions onto the
scene
• Cryptocurrency (token based finance) is a haven for criminals
• There must be oversight to create legitimacy.
• This need for more scrutiny also applies to impact tokens.
We believe that it is important to establish and apply criteria
that allow impact investors to assess the integrity of an
impact token and its ability to channel funds to enable
desired impact outcomes.
Freely accessible open-source code is the
foundation upon which the decentralized
economy of the future will be built.
Cyber Defense Resources
Where Does Blockchain Go From Here For
Impact Tokens and Sustainable Energy?
• As shown, blockchain is a game-changing technology that can contribute
to scale impact investment by providing trust, transparency and low
transaction costs.
• However, it is early days for impact tokens, and the impact investment
community needs to be prepared for a trial and error approach. As
demonstrated by the complex establishment of the carbon market –
arguably the world’s first large-scale payment-for-impact schemes – the
first priority must be in developing trust, and thus to build consensus
around processes and procedures in the community.
• Only by broad cooperation within the interested community, and the
willingness to commit to common standards, can impact tokens reap the
potential advantages provided by blockchain technology, and ultimately
lead to unlocking of finance at scale to achieve the Sustainable
Development Goals.
Cyber Defense Resources
Blockchain, A Solution For Counterfeiting in Semiconductor Industry
Photo credit: SparkFunElectronics via Visual hunt
According to the Semiconductor Industry
Association, counterfeits cost U.S.
semiconductor companies more than $7.5
billion annually in lost revenue. But, more
importantly, counterfeit components pose
major threats to the health, safety, and
security of people worldwide.
With this system, the only way to provide 100 counterfeit components is to own another
100 real components of the same manufacturing part number and the same date code.
However, if you sell the 100 counterfeit components, you will no longer be able to prove
that the real ones are real. Counterfeiters will be out of business. If all buyers request their
transactions in bitcoins then you won’t be able to sell the real ones. Of course, you can still
use the real ones for your own production but manufacturers are not counterfeiters.
100% safe, viable and robust.
Cyber Defense Resources
• California Governor Jerry Brown
has signed a cybersecurity law
covering “smart” devices, making
California the first state with such
a law. The bill, SB-327, was
introduced last year and passed
the state senate in late August.
• Starting on January 1st, 2020, any
manufacturer of a device that
connects “directly or indirectly” to
the internet must equip it with
“reasonable” security features,
designed to prevent unauthorized
access, modification, or
information disclosure. If it can be
accessed outside a local area
network with a password, it needs
to either come with a unique
password for each device, or force
users to set their own password
the first time they connect. That
means no more generic default
credentials for a hacker to guess.
California: First State with an Internet of Things (IoT) Cybersecurity Law
Cyber Defense Resources
Recently it was discovered that Roku
and Samsung TVs could be hacked and
wirelessly controlled in a second, and
there was also that brief phase where
Amazon’s Alexa was letting off a
creepy laugh. Not to mention the
incident in the Netherlands when a
woman was being stalked through an
internet-connected camera in her
living room.
Frey Effect
EMR & RF NOW
2B Carrageenan
Same as DDT
Today the International
Journal of Oncology published
a critique of the World Health
Organization's pending review
of the adverse health effects
of wireless (i.e., radio
frequency or RF) radiation.
The critique was written by Dr.
Lennart Hardell, the world's
preeminent researcher on
brain tumor risk and long-term
cell phone use.
Cyber Defense Resources
CYBER WAR
During the Cold War, the United States
feared that the Soviet Union was
seeking to turn microwave radiation into
covert weapons of mind control. More
recently, the U.S. military itself sought
to develop microwave weapons for
psychological warfare.
Strikes with microwaves are sonic
attacks creating brain damage,
viral infections and contagious
anxiety.
• In September 2017, a Russia-based
organization spent US$100,000 on
advertisements promoting divisive
political issues during the US
presidential campaign.
• Facebook said it would provide the ads
to congressional investigators
• Facebook has launched tools to make
all ads it runs publicly accessible
• In October 2017, Twitter announced it
would ban Russia Today (RT) and
Sputnik following the US intelligence
investigation positive findings.
• Twitter is launching an “Advertising
Transparency Center” that will
1. provide details about all ads
carried on its platform,
2. place clear visual markers on
political advertisements,
3. disclose how political ads are
targeted and
4. strengthen policies regarding
political advertising.
REOUTERS/baz
Moscow warns Google not to meddle in
elections Sept. 9, 2018 with YouTube videos
organized by opposition leader Alexei Navalny.
Russia’s Central Election Commission, the
Prosecutor-General’s Office and Roskomnadzor,
the government’s internet and media
watchdog, sent complaints to Google boss
Larry Page in response to Mr. Navalny’s videos.
“Mr. Navalny buys the company’s advertising
tools to publish information on YouTube on the
day of elections,” commission member
Alexander Klyukin said. “We informed Google
that such events on election day will lead to
massive violation of the law,” Mr. Klyukin told
reporters, adding: “Meddling by a foreign
company in our election is not permitted.”
WHERE DOES FREEDOM OF
SPEECH END AND SAFETY
AND SECURITY BEGIN?
Cyber Defense Resources
1. Climate change will be insanely expensive.
2. Hundreds of millions of people may be displaced by 2050.
3. Dengue and malaria could spread in the U.S.
4. Western wildfires could burn up to eight times as much land by 2100.
5. An additional 8% of the world population will experience water scarcity by 2100.
6. Hurricanes could become up to 11% more intense and 20% wetter by 2100.
7. Four times as many New Yorkers could live in areas that flood by 2050.
8. Millions of people and trillions in assets are at risk in coastal cities.
9. 136 of the world's most historic places could be in jeopardy.
10. Global wheat and maize yields are already beginning to decline.
11. Some small island nations could be destroyed.
12. 100% of reefs may be at risk of extinction by 2050.
13. Within 300 years, 88% of New Orleans could be underwater
14. Increasing droughts will make the driest regions even drier.
15. 63% of major wine regions could be jeopardized by 2050.
16. Some reptiles species could turn mostly female, potentially leading to their extinction
17. Atlanta and New York could see twice as many days of thunderstorms a year by 2100.
18. Many countries are losing their main dry season water source.
19. Air Pollution in California could created a serious public health hazard.
20. Equatorial regions and parts of the Antarctic will see up to a 50% decrease in their fisheries.
21. Some animals are shrinking.
22. An additional 20 million more children will go hungry by 2050.
DOOM
AND
GLOOM
for 2050
Cyber Defense Resources
The World in 2050
Reported by
Business Insider
Life in the Robotic/Digital Age by 2050
Child mortality rates will be vastly lower.
• The Copenhagen report predicts the rate dropping to 31 per 1,000 live births in 2050
• More dramatic declines in regions like Africa.
We'll have vaccines and cures for many diseases.
• HIV: kills anywhere from 1.5 million to 2 million people
• Malaria: kills 1 million people a year
• British-bred genetically modified mosquitoes causing parasite to self-destruct
• Alzheimer's: reversing Alzheimer's could be available in five years.
PREVENTION: Given to patients whose families have a history of Alzheimer's
• Meningitis: U.S. vaccine that other countries will soon adopt
• Cancer: A rheumatoid arthritis drug cured a now 7 year old of life threatening cancer.
A modified measles vaccine caused cancer remission. Nanoparticles developed to attack cancer
stem cells Cancer Vaccines Teach the immune system to attack cancer directly
Humans could live forever as computerized brains
• Neuroscientist Randal Koene and Russian financial-backer Dmitry Itskov "mapping the brain” are trying to transfer
human consciousness and brain functions to an artificial body by 2045
There will be no more poor countries
• 700 million fewer people lived in extreme poverty in 2010 than in 1990
• Extreme poverty was defined as $1 day in 1990, was redefined as $1.25 a day in 2008
World Bank lowered extreme poverty to no more than 3% of the population by 2030
• Global climate change is threatening the homes and livelihoods of Panama and a once fishing community in England
Artificial intelligence will be insanely good
• Hans Moravec of Carnegie Mellon University's Robotics Institute predicts that by 2050 robots will outperform
humans both physically and intellectually and will run entire businesses by themselves.
• Humans will pursue social (emotional relationships) recreational and artistic creative pursuits
• “Work” will take on a new meaning with Guaranteed Minimum Income guranteed eradicating poverty
THE
PROMISE
LAND 2050
Source: Business Insider
Cyber Defense Resources
The World in 2050
Reported by
Business Insider
We will have the ability to rely almost exclusively on renewable, clean energy
• World Wildlife Fund report: 95% energy supplied by clean energy cutting greenhouse emissions 80%
 Solar provide half of the world's electricity/half of building heating/15% industrial heat and fuel
 Additional Wind Turbines: million onshore and 100,000 offshore (float on water)
 Ocean power: waves and tides
 Biomass: plant materials and animal waste
 Geothermal derived from the Earth's crust
 Hydropower
Cars could be vastly safer, smarter, and cleaner
• Driverless cars safer by eliminating human error, which causes 90% of car accidents--Milken Institute.
 4.95 million fewer accidents, 30,000 fewer deaths, and 4.8 billion fewer commuting hours
 Save Americans $500 billion per year in costs of car accidents, fuel, and lost productivity
• Electric cars will also be widespread totaling 157 million electric cars and light trucks
 Worldwide annual production 7 million by 2020 and 100 million by 2050-- Enel, Italy's largest power company
o Reduce CO2 emissions from transportation by 30%
o Significantly reducing oil consumption
Greater gender equality will improve the global economy and society
• Women’s productivity losses fall to just 4% of world GDP
• Households run with no more gender bias, children raising included
• IN 1900 Loss of 17% GDP due to Women’s lower pay and exclusion from the work sector
Almost all adults will know how to read
• Experts estimates that illiteracy rates will fall to just 12% and cost only about 3.8% of GDP
There may be much less warfare worldwide
• ARMED CONFLICTS DOWN 15% from 2009 and only with 7% of countries
o India, Nigeria, Sudan, Ethiopia, and Tanzania will be at the greatest risk of armed conflict in 2050
o factors like education, infant mortality, past conflicts, oil, ethnicities, and youth population
Cyber Defense Resources
2050:THE
PROMISE
LAND
The World in 2050
Reported by
Business Insider
The internet will reach every corner of the world (Possible Government Intervention)
• More than 8 billion people will go online, 97.5% of the population --The World We Made Forum Jonathon Porritt
• 2018: 40% of the globe has internet access, with 78% of users in developed countries and 32% in developing
countries. That's about 2.85 billion people, many of whom get internet access from mobile phones
• Google's Project Loon and Internet.org specifically focus on bringing the web to areas where people don't yet have it
Artificial body parts could make organ shortages a thing of the past
• Who won't have to wait for another person to die before getting a life-sustaining
organ
• The technology for lab-grown bladders can also be combined with 3D printing of a
person's own stem cells to make organ rejection a thing of the past. This process
involves growing stem cells in the lab after removing them from a patient, then
planting them into the 3D-printed body part. The cells grow on the scaffolding,
creating an organ compatible with the recipient
Baby-making will become more sophisticated along with Designer Babies
• Genetic engineering can make sick children healthy by removing or replacing diseased genes
• Perfect children eliminate crooked teeth or bad eyesight
• Create super humans choosing genes to improve IQ, height, hair color, eye color , sex
New translation tools will CLOSE GLOBAL COMMUNICATION GAPS
• By wearing a pair of special goggles or using a phone app
• Microsoft unveiled a "Star Trek"-like demo for real-time translation over Skype
2050:THE
PROMISE
LAND
Cyber Defense Resources
The World in 2050
Reported by
Business Insider
“1984” IS FINALLY 2018
GETTING CHPPED: OMG! Monitoring or firing people who break
the rules. A bored or distracted worker is not necessarily non-
productive. Control of this type already exist in companies such
as Crossover. Supervisors constantly evaluate each ten-minute
work period of their team using monitoring tools such as
WorkSmart compiling statistics on the applications and websites
each contractor has opened, the time spent on them, keystrokes
and mouse movements. Every 10 minutes, randomly and without
warning, a photo is taken by webcam and saved. More than 1,500
people in 80 countries are monitored in this way, with the
company paying for time it considers used to the companies
fullest benefit.
Facial Recognition: Feds catch person enter U.S. illegally
Biometrics Facial Recognition: Gather demographic data on
crowds for retail marketing industry.
Banking apps (USAA), payment apps (MasterCard’s video
selfie system) The bank is the first large American financial
institution to offer facial recognition as an option for accessing its
mobile app, which lets users check their balance, make deposits,
view statements and reach customer service representatives.
Globally, law enforcement biometric software identify faces in
CCTV footage and specialized sun glasses.
St. Mary’s Catholic secondary school in St. Louis uses
biometric cameras to keep campuses safe.
Cyber Defense Resources
Security Robots Market to Witness Huge Growth by 2023: Key
Players– Knightscope, Endeavor Robotics, Lockheed Martin, IRobot
The Global Security and Law
Enforcement Robots Market will
grow by over USD 2.36 billion
during the period 2017-2022.
including unmanned Aerial,
Ground and Underwater
vehicles, border patrolling and
bomb detection, and security
and law enforcement robots
manufacturers including Boston
Dynamics, Endeavor Robotics,
Lockheed Martin, and SMP
Robotics.
Key Companies: RoboteX,
Knightscope, Endeavor
Robotics, Lockheed Martin,
IRobot, Northrop Grumman,
BAE Systems PLC, Thales SA,
Elbit Systems, Qinetiq Group
PLC, Finmeccanica SPA &
Aerovironment.
Application: Airport, Warehouse, Bank,
Pavilion & Other, Product Type: , Indoor Type
Security Robots & Outdoor Type Security
Robots.
Cyber Defense Resources
Flexible Ultra-Thin Organic Optoelectronics – for displays, photovoltaics
& wearable sensors – is at the verge of large-scale commercialisation,
with prototype devices already achieving staggering form factors and
bending curvatures.
Lasers on the eye – ocular lasers – New development of an ultra-thin
membrane laser using organic semiconductors. For new applications in
security, biophotonics & photomedicine.
Each membrane is able to produce a unique "barcode” like a wearable
security tag.
• Engineers in Scotland developed laser for the eyes
NEW Ultra-thin Membrane Laser Using Organic Semiconductors
Cyber Defense Resources
Evidence Link Between Schizophrenia, Violent Crime
Schizophrenia: brain disease with neural deficiencies:
incapable of intimacy or remorse.
Typically controlling and hiding behind a false image.
Researchers at Stanford turned blood cells
into neurons, the building blocks of central
nervous system & of the brain
Patients with this disease either have damaged
or absent neuro-anatomical structures
They live in an altered state of reality.
We can complete this shape-shifting transformation of one cell
type into another by adding just four specific proteins—which
we determined play vital roles in brain development—to freshly
drawn or stored blood cells. These four factors are enough to
rapidly reprogram these cells and transform them into neurons
within a few weeks of treatment.
Could We Prevent Crime in the Future?
Cyber Defense Resources
Caltech Scientists Can Predict Intelligence from Brain Scans
MINORITY REPORT: Could We Prevent Crime in the Future?
Neuroscientists at the California Institute of
Technology (Caltech) have conducted the most
comprehensive brain mapping to date of the
cognitive abilities measured by the Wechsler
Adult Intelligence Scale (WAIS), the most
widely used intelligence test in the world. The
results offer new insight into how the various
factors that comprise an "intelligence
quotient" (IQ) score depend on particular
regions of the brain.
All of the patients had some degree of cognitive
impairment from events such as strokes, tumor
resection, and traumatic brain injury, as assessed by
testing using the WAIS
Cyber Defense Resources
Please donate to the recovery of
victims from Con Artists
Robin Austin
robinmaustinceo@gmail.com
Download my book: “Truth Will Out; Love,
Larceny and Vindication from
gofundme.com/truth-will-out-recovery
Cyber Defense Resources

Más contenido relacionado

La actualidad más candente

Eclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupEclipse M2M Industry Working Group
Eclipse M2M Industry Working Group
Benjamin Cabé
 
Internet of Things Insights of Applications in Research and Innovation to Int...
Internet of Things Insights of Applications in Research and Innovation to Int...Internet of Things Insights of Applications in Research and Innovation to Int...
Internet of Things Insights of Applications in Research and Innovation to Int...
ijtsrd
 
33977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_1433977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_14
Alex Blanter
 

La actualidad más candente (20)

Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015
 
IoT Systems: Technology, Architecture & Performance
IoT Systems: Technology, Architecture & PerformanceIoT Systems: Technology, Architecture & Performance
IoT Systems: Technology, Architecture & Performance
 
India, Internet of things and the role of government
India, Internet of things and the role of governmentIndia, Internet of things and the role of government
India, Internet of things and the role of government
 
The IP of Internet of Things (IoT)
The IP of Internet of Things (IoT)The IP of Internet of Things (IoT)
The IP of Internet of Things (IoT)
 
Eclipse M2M Industry Working Group
Eclipse M2M Industry Working GroupEclipse M2M Industry Working Group
Eclipse M2M Industry Working Group
 
Internet of Things Insights of Applications in Research and Innovation to Int...
Internet of Things Insights of Applications in Research and Innovation to Int...Internet of Things Insights of Applications in Research and Innovation to Int...
Internet of Things Insights of Applications in Research and Innovation to Int...
 
IBM Internet of Things Offerings
IBM Internet of Things OfferingsIBM Internet of Things Offerings
IBM Internet of Things Offerings
 
IoT
IoTIoT
IoT
 
Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017Industrial internet of things (IIOT) - special report-2017
Industrial internet of things (IIOT) - special report-2017
 
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
Internet of Things (IoT) Strategic Patent Development and Monetization for Ne...
 
33977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_1433977_IoT_in_HighTech_11_03_14
33977_IoT_in_HighTech_11_03_14
 
Top Internet of Things Predictions for 2017
Top Internet of Things Predictions for 2017Top Internet of Things Predictions for 2017
Top Internet of Things Predictions for 2017
 
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
Effect of Mixing and Compaction Temperatures on the Indirect Tensile Strength...
 
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated StrategyInternet of Things (IoT) Business & Technology & Patent Integrated Strategy
Internet of Things (IoT) Business & Technology & Patent Integrated Strategy
 
Free Ebook in AI, Robotics, Blockchain, IoT, Big data/Data Science, Cybersecu...
Free Ebook in AI, Robotics, Blockchain, IoT, Big data/Data Science, Cybersecu...Free Ebook in AI, Robotics, Blockchain, IoT, Big data/Data Science, Cybersecu...
Free Ebook in AI, Robotics, Blockchain, IoT, Big data/Data Science, Cybersecu...
 
Internet of Things Challenges and Solutions
Internet of Things Challenges and SolutionsInternet of Things Challenges and Solutions
Internet of Things Challenges and Solutions
 
Internet of Things Ecosystem
Internet of Things Ecosystem Internet of Things Ecosystem
Internet of Things Ecosystem
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business Models
 
IoT Masterclass ESGT Santarem - Connecting The Dots
IoT Masterclass ESGT Santarem -  Connecting The DotsIoT Masterclass ESGT Santarem -  Connecting The Dots
IoT Masterclass ESGT Santarem - Connecting The Dots
 
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George IosifIoT and Embedded OS Lecture - Cristian Toma and George Iosif
IoT and Embedded OS Lecture - Cristian Toma and George Iosif
 

Similar a The IoT Battlefield 2018

The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)
Gerardo Pardo-Castellote
 
Smart Cities and Intelligent Buildings.pptx
Smart Cities and Intelligent Buildings.pptxSmart Cities and Intelligent Buildings.pptx
Smart Cities and Intelligent Buildings.pptx
ReetaDutta1
 
Presentation-Smart-Cities-International-Virtual-Symposium-2021.pptx
Presentation-Smart-Cities-International-Virtual-Symposium-2021.pptxPresentation-Smart-Cities-International-Virtual-Symposium-2021.pptx
Presentation-Smart-Cities-International-Virtual-Symposium-2021.pptx
SharanabasappaDegoan
 

Similar a The IoT Battlefield 2018 (20)

Strategic Patent Management & Monetization 2Q 2015
Strategic Patent Management & Monetization 2Q 2015Strategic Patent Management & Monetization 2Q 2015
Strategic Patent Management & Monetization 2Q 2015
 
IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?
IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?
IDTechEx Research: Internet of Things - After the Hype: So Who's Buying IoT?
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT Stack
 
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
IoT-Where is the Money? - Chandrashekar Raman, Engagement Manager, IoT Strate...
 
Revue de presse IoT / Data du 28/01/2017
Revue de presse IoT / Data du 28/01/2017Revue de presse IoT / Data du 28/01/2017
Revue de presse IoT / Data du 28/01/2017
 
AI, Blockchain, IoT Convergence Use Case System Implementation Insights from ...
AI, Blockchain, IoT Convergence Use Case System Implementation Insights from ...AI, Blockchain, IoT Convergence Use Case System Implementation Insights from ...
AI, Blockchain, IoT Convergence Use Case System Implementation Insights from ...
 
AI Blockchain IoT Convergence for ESG Digital Transformation Insights from Pa...
AI Blockchain IoT Convergence for ESG Digital Transformation Insights from Pa...AI Blockchain IoT Convergence for ESG Digital Transformation Insights from Pa...
AI Blockchain IoT Convergence for ESG Digital Transformation Insights from Pa...
 
10 predictions for the future of IoT
10 predictions for the future of IoT10 predictions for the future of IoT
10 predictions for the future of IoT
 
Internet of Things- IoT Monetization Models
Internet of Things- IoT Monetization ModelsInternet of Things- IoT Monetization Models
Internet of Things- IoT Monetization Models
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
ISA Toronto Chapter Presentation-March 2017
ISA Toronto  Chapter Presentation-March 2017ISA Toronto  Chapter Presentation-March 2017
ISA Toronto Chapter Presentation-March 2017
 
Training Report DRDO.pptx
Training Report DRDO.pptxTraining Report DRDO.pptx
Training Report DRDO.pptx
 
The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)The Platform for the Industrial Internet of Things (IIoT)
The Platform for the Industrial Internet of Things (IIoT)
 
Smart Cities and Intelligent Buildings.pptx
Smart Cities and Intelligent Buildings.pptxSmart Cities and Intelligent Buildings.pptx
Smart Cities and Intelligent Buildings.pptx
 
Presentation-Smart-Cities-International-Virtual-Symposium-2021.pptx
Presentation-Smart-Cities-International-Virtual-Symposium-2021.pptxPresentation-Smart-Cities-International-Virtual-Symposium-2021.pptx
Presentation-Smart-Cities-International-Virtual-Symposium-2021.pptx
 
Day2 Lynne Canavan
Day2 Lynne Canavan Day2 Lynne Canavan
Day2 Lynne Canavan
 
What brings 2020 and beyond?
What brings 2020 and beyond?What brings 2020 and beyond?
What brings 2020 and beyond?
 
Monetizing the internet of things extracting value from the connectivity o...
Monetizing  the internet of things   extracting value from the connectivity o...Monetizing  the internet of things   extracting value from the connectivity o...
Monetizing the internet of things extracting value from the connectivity o...
 
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
Monetizing the Internet of Things: Extracting Value from the Connectivity Opp...
 
IoT and AI
IoT and AIIoT and AI
IoT and AI
 

Último

📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
@Chandigarh #call #Girls 9053900678 @Call #Girls in @Punjab 9053900678
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
nilamkumrai
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 

Último (20)

"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
6.High Profile Call Girls In Punjab +919053900678 Punjab Call GirlHigh Profil...
 
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
( Pune ) VIP Pimpri Chinchwad Call Girls 🎗️ 9352988975 Sizzling | Escorts | G...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 

The IoT Battlefield 2018

  • 1. There is a Price and a Risk For Every Advancement. Are We Willing to Sacrifice Our Privacy for Global Connectedness and Convenience? Robin M. Austin © October 2018 The IoT Battlefield Cyber Defense Resources
  • 2. The Top 10 IoT Segments in 2018 – based on 1,600 real IoT projects Source: IoT Analytics, The Top 10 IoT Segments in 2018 – based on 1,600 real IoT projects. Cyber Defense Resources IoT Analytics
  • 3. THERE IS A DISCONNECT: FAILURE Security Strategy For IoT Deployments When Asked These Are the Top Concerns Cyber Defense Resources
  • 4. TRUTH IS HARD TO SWALLOW • Businesses Cyber breaches almost doubled in 5 yrs. – from 68 per business in 2012 – to 130 per business in 2017 – 36 stopped by law enforcement successes in 2010–2012 • Resurgence: “dark net” markets for malware goods & services – 37 in 2016 alone – 357 million new malware variants were released • “banking trojans” designed to steal account login details could be purchased for as little as US$500.38 • Cyber criminals have an exponentially increasing number of potential targets, because the use of cloud services and IoT devices Cyber Defense Resources
  • 5. 2016 Bug Bounty Hacker Report Seen a Success • April 2016: U.S. FEDs launched Department of Defense’s Hack • Shortly after: Pentagon followed with U.S. Army, U.S. Air Force & GSA • May 2017: Technology Transformation Service (GSA) and IRS • Next: U.S. Senators introduced Fed. Bug Bounty Program for DHS • Followed by: U.K. announced a vulnerability disclosure policy pilot • Next: DOJ quietly released guidelines so you can design your own software vulnerability disclosure programs – To avoid legal issues traditionally caused when a hacker remotely accesses a computer system without prior consent – Because confidential information on internal “bugs” affecting a company’s own systems or products can complicate Computer Fraud and Abuse Act, or CFAA, which has been applied in different court cases in a variety of conflicting ways. BUGemot Cyber Defense Resources
  • 6. HackerOne Since 2013, over 800 programs have launched ABOUT HACKERONE: • #1 bug bounty vulnerability disclosure platform • Largest community of ethical hackers • Collectively paying out $17 million in cash • 50,000 security vulnerabilities fixed & rendered unexploitable Cyber Defense Resources
  • 7. IoT TOP PATENT HOLDERS: Samsung, Qualcomm, LG, Huawei, and Intel Cyber Defense Resources
  • 8. Cyber Defense Resources Global Embedded Security
  • 9. IoT “CHIP” Security Challenges 1. Gaps in technical sophistication 2. Standards are absent or immature 3. Customers view IoT security as a commodity 4. Semiconductor companies struggle to profit from security Cyber Defense Resources
  • 10. Who Will Develop Security for IoT Cyber Defense Resources
  • 11. What makes each IoT device special is also what makes it vulnerable. They are tiny, and normally only possess enough intelligence to perform a single function. That’s why they can fit almost anywhere. But unfortunately, given our current technology, that does not leave a lot of room for things like memory, processors or any good way to increase computing power. If you try to add power to an IoT device, you end up also increasing its size, power requirements, heat generation and other factors. At some point, it’s no longer an IoT device, and can’t perform its role as one. Because of size and processor constraints, most IoT devices have no security at all. Others like web cameras ship with basic password protection, which is better than nothing, but then users forget to change the default passwords, leaving the device vulnerable to a simple attack. I have recently reviewed IoT programs that are designed to protect IoT by installing them behind a dedicated frontend system. Manufacturers have little interest in adding native security. Home users won’t have access to enterprise-level cybersecurity platforms. The National Institute of Standards and Technology believes it has the answer and is trying to work with industry and even individuals to develop standards for lightweight encryption. This is a project that NIST began quite some time ago, back in 2013 to be exact. But it has taken this long, and several workshops, to get the Lightweight Cryptographic Project to a point where we can almost start deploying the kinds of protection that IoT needs, and that we need from our IoT. Cyber Defense Resources
  • 12. The list price for a new Tesla Powerwall 2.0 battery, which offers twice the storage capacity of the original Powerwall, is $5,900. Supporting hardware adds another $700 to the equipment costs, bringing the total to $6,600. Installation can add anywhere from $2,000 to $8,000 to the final bill. Distributed Battery Storage Will Surpass Grid-Scale Storage in the US by 2020 Cyber Defense Resources
  • 13. A Thai-based renewable energy technology company, Energy Absolute, plans to invest $3 billion in battery gigafactory. The plant is expected to be larger than Japanese electronics maker Panasonic's 35GWh factory for US electric car maker Tesla in the state of Nevada. Energy Absolute also plans to set up 1,000 charging stations for electric cars in Bangkok and elsewhere by the end of the year, before moving to the battery market. Cyber Defense Resources TECHNOLOGY RENEWABLE ENERGY INVESTMENT
  • 14. The Hidden Cost of the Electric Car Boom – Child Labor Some of the most significant developments in the electric car market are likely to come from China, where the market for electric vehicles grew by 72% last year, with 94% of that market owned by domestic manufacturers. Car ownership rates less than a quarter of those in Europe, the demand for electric vehicles in China looks set to explode. A critical raw material in lithium-ion battery production, cobalt is in high demand. It is needed to power smartphones, tablets, and laptops as well as electric vehicles, but it is the latter where astronomical growth risks perpetuating misery. Dangerous working conditions, risks to people’s health, and child labor is a huge problem in the cobalt mines of the Democratic Republic of the Congo (DRC). Two-thirds of the world’s cobalt is found in the DRC, which is one of the world’s poorest and least developed countries with a gross national income per capita of just $481. Cyber Defense Resources
  • 15. 43 Battery Storage Companies To Watch • ABB: One of the largest power and automation companies in the world, and focused on cleantech. It offers distributed energy storage modules for grid storage purposes, such as peak shaving, load shifting voltage regulation, renewable integration, and backup power. • AESC: Automotive Energy Supply Corporation is one of three “leaders” in the electric vehicle (EV) battery space, according to a Navigant Research report on the market. Being in the EV battery space, it (naturally) produces lithium-ion batteries, using lithium manganate as the cathode. • AES Energy Storage: Although AES has been in the energy business for 30 years, this certainly doesn’t mean that they aren’t worth keeping an eye on for the upcoming year. This market leader has the largest fleet of grid batteries in commercial service and received a notable award in November 2014 of a 20-year contract with Southern California Edison of 100 MW of interconnected battery energy storage. AES partners with industry-leading utilities and power system operators on energy storage projects. • Alevo: popped out of a long stealth mode in 2014 and is bringing the “first inorganic lithium battery” to the commercial market. It’s near the top of the list here thanks to the alphabet and choice of name, but it’s also one of the most promising-looking companies on the list, imho. It is targeted at the grid storage market. • Ambri: Spun out of MIT and developing liquid metal battery technology for the past few years. It has an initial factory in place.The batteries are targeted for stationary storage applications. • Amprius: develops high-capacity lithium-ion batteries that originated at Stanford University. Investors include Trident Capital, VantagePoint Capital Partners, IPV Capital, Kleiner Perkins Caufield & Byers, SAIF Partners, Chinergy Capital, Google Chairman Eric Schmidt, and Stanford University. Former Secretary of Energy Steven Chu sits on the board. • Aquion Energy: Aqueous hybrid ion battery technology boasts “long cycle life at 100% depth of discharge for long duration (4 to 20 hour) applications.” • Bosch: It may not be Bosch’s signature product, but the technology giant is offering energy storage and related technology and service solutions, particularly in connection with solar and wind power installations. Cyber Defense Resources
  • 16. In 2017 Samsung Electronics’ technology institute, Samsung Advanced Institute of Technology (SAIT), had developed a core battery technology which used graphene to deliver longer operating times and faster charging. The graphene ‘balls’ are said to boost battery capacity by 45%, whilst making the rate at which the battery charges five times faster than current standards A university in CHINA nanopolymer laboratory reported that after 250,000 instances of charging, the graphene- based battery retained 91% of its capacity, as well as remaining stable under extreme temperatures Cyber Defense Resources Samsung, appears to have discovered the holy grail of commercial graphene production:
  • 17. • BlackBerry is back with Cloud-based Security Platform for IoT (01/2015) – Collaboration platform for application developers & business partners initially for automotive sector soon to extend to energy and healthcare. – Blockchain Smartphone Cyber Defense Resources
  • 18. A Need for Due Diligence • The recent hype to raise funds for blockchain projects brought charlatans with fraudulent intentions onto the scene • Cryptocurrency (token based finance) is a haven for criminals • There must be oversight to create legitimacy. • This need for more scrutiny also applies to impact tokens. We believe that it is important to establish and apply criteria that allow impact investors to assess the integrity of an impact token and its ability to channel funds to enable desired impact outcomes. Freely accessible open-source code is the foundation upon which the decentralized economy of the future will be built. Cyber Defense Resources
  • 19. Where Does Blockchain Go From Here For Impact Tokens and Sustainable Energy? • As shown, blockchain is a game-changing technology that can contribute to scale impact investment by providing trust, transparency and low transaction costs. • However, it is early days for impact tokens, and the impact investment community needs to be prepared for a trial and error approach. As demonstrated by the complex establishment of the carbon market – arguably the world’s first large-scale payment-for-impact schemes – the first priority must be in developing trust, and thus to build consensus around processes and procedures in the community. • Only by broad cooperation within the interested community, and the willingness to commit to common standards, can impact tokens reap the potential advantages provided by blockchain technology, and ultimately lead to unlocking of finance at scale to achieve the Sustainable Development Goals. Cyber Defense Resources
  • 20. Blockchain, A Solution For Counterfeiting in Semiconductor Industry Photo credit: SparkFunElectronics via Visual hunt According to the Semiconductor Industry Association, counterfeits cost U.S. semiconductor companies more than $7.5 billion annually in lost revenue. But, more importantly, counterfeit components pose major threats to the health, safety, and security of people worldwide. With this system, the only way to provide 100 counterfeit components is to own another 100 real components of the same manufacturing part number and the same date code. However, if you sell the 100 counterfeit components, you will no longer be able to prove that the real ones are real. Counterfeiters will be out of business. If all buyers request their transactions in bitcoins then you won’t be able to sell the real ones. Of course, you can still use the real ones for your own production but manufacturers are not counterfeiters. 100% safe, viable and robust. Cyber Defense Resources
  • 21. • California Governor Jerry Brown has signed a cybersecurity law covering “smart” devices, making California the first state with such a law. The bill, SB-327, was introduced last year and passed the state senate in late August. • Starting on January 1st, 2020, any manufacturer of a device that connects “directly or indirectly” to the internet must equip it with “reasonable” security features, designed to prevent unauthorized access, modification, or information disclosure. If it can be accessed outside a local area network with a password, it needs to either come with a unique password for each device, or force users to set their own password the first time they connect. That means no more generic default credentials for a hacker to guess. California: First State with an Internet of Things (IoT) Cybersecurity Law Cyber Defense Resources Recently it was discovered that Roku and Samsung TVs could be hacked and wirelessly controlled in a second, and there was also that brief phase where Amazon’s Alexa was letting off a creepy laugh. Not to mention the incident in the Netherlands when a woman was being stalked through an internet-connected camera in her living room.
  • 22. Frey Effect EMR & RF NOW 2B Carrageenan Same as DDT Today the International Journal of Oncology published a critique of the World Health Organization's pending review of the adverse health effects of wireless (i.e., radio frequency or RF) radiation. The critique was written by Dr. Lennart Hardell, the world's preeminent researcher on brain tumor risk and long-term cell phone use. Cyber Defense Resources CYBER WAR During the Cold War, the United States feared that the Soviet Union was seeking to turn microwave radiation into covert weapons of mind control. More recently, the U.S. military itself sought to develop microwave weapons for psychological warfare. Strikes with microwaves are sonic attacks creating brain damage, viral infections and contagious anxiety.
  • 23. • In September 2017, a Russia-based organization spent US$100,000 on advertisements promoting divisive political issues during the US presidential campaign. • Facebook said it would provide the ads to congressional investigators • Facebook has launched tools to make all ads it runs publicly accessible • In October 2017, Twitter announced it would ban Russia Today (RT) and Sputnik following the US intelligence investigation positive findings. • Twitter is launching an “Advertising Transparency Center” that will 1. provide details about all ads carried on its platform, 2. place clear visual markers on political advertisements, 3. disclose how political ads are targeted and 4. strengthen policies regarding political advertising. REOUTERS/baz Moscow warns Google not to meddle in elections Sept. 9, 2018 with YouTube videos organized by opposition leader Alexei Navalny. Russia’s Central Election Commission, the Prosecutor-General’s Office and Roskomnadzor, the government’s internet and media watchdog, sent complaints to Google boss Larry Page in response to Mr. Navalny’s videos. “Mr. Navalny buys the company’s advertising tools to publish information on YouTube on the day of elections,” commission member Alexander Klyukin said. “We informed Google that such events on election day will lead to massive violation of the law,” Mr. Klyukin told reporters, adding: “Meddling by a foreign company in our election is not permitted.” WHERE DOES FREEDOM OF SPEECH END AND SAFETY AND SECURITY BEGIN? Cyber Defense Resources
  • 24. 1. Climate change will be insanely expensive. 2. Hundreds of millions of people may be displaced by 2050. 3. Dengue and malaria could spread in the U.S. 4. Western wildfires could burn up to eight times as much land by 2100. 5. An additional 8% of the world population will experience water scarcity by 2100. 6. Hurricanes could become up to 11% more intense and 20% wetter by 2100. 7. Four times as many New Yorkers could live in areas that flood by 2050. 8. Millions of people and trillions in assets are at risk in coastal cities. 9. 136 of the world's most historic places could be in jeopardy. 10. Global wheat and maize yields are already beginning to decline. 11. Some small island nations could be destroyed. 12. 100% of reefs may be at risk of extinction by 2050. 13. Within 300 years, 88% of New Orleans could be underwater 14. Increasing droughts will make the driest regions even drier. 15. 63% of major wine regions could be jeopardized by 2050. 16. Some reptiles species could turn mostly female, potentially leading to their extinction 17. Atlanta and New York could see twice as many days of thunderstorms a year by 2100. 18. Many countries are losing their main dry season water source. 19. Air Pollution in California could created a serious public health hazard. 20. Equatorial regions and parts of the Antarctic will see up to a 50% decrease in their fisheries. 21. Some animals are shrinking. 22. An additional 20 million more children will go hungry by 2050. DOOM AND GLOOM for 2050 Cyber Defense Resources The World in 2050 Reported by Business Insider
  • 25. Life in the Robotic/Digital Age by 2050 Child mortality rates will be vastly lower. • The Copenhagen report predicts the rate dropping to 31 per 1,000 live births in 2050 • More dramatic declines in regions like Africa. We'll have vaccines and cures for many diseases. • HIV: kills anywhere from 1.5 million to 2 million people • Malaria: kills 1 million people a year • British-bred genetically modified mosquitoes causing parasite to self-destruct • Alzheimer's: reversing Alzheimer's could be available in five years. PREVENTION: Given to patients whose families have a history of Alzheimer's • Meningitis: U.S. vaccine that other countries will soon adopt • Cancer: A rheumatoid arthritis drug cured a now 7 year old of life threatening cancer. A modified measles vaccine caused cancer remission. Nanoparticles developed to attack cancer stem cells Cancer Vaccines Teach the immune system to attack cancer directly Humans could live forever as computerized brains • Neuroscientist Randal Koene and Russian financial-backer Dmitry Itskov "mapping the brain” are trying to transfer human consciousness and brain functions to an artificial body by 2045 There will be no more poor countries • 700 million fewer people lived in extreme poverty in 2010 than in 1990 • Extreme poverty was defined as $1 day in 1990, was redefined as $1.25 a day in 2008 World Bank lowered extreme poverty to no more than 3% of the population by 2030 • Global climate change is threatening the homes and livelihoods of Panama and a once fishing community in England Artificial intelligence will be insanely good • Hans Moravec of Carnegie Mellon University's Robotics Institute predicts that by 2050 robots will outperform humans both physically and intellectually and will run entire businesses by themselves. • Humans will pursue social (emotional relationships) recreational and artistic creative pursuits • “Work” will take on a new meaning with Guaranteed Minimum Income guranteed eradicating poverty THE PROMISE LAND 2050 Source: Business Insider Cyber Defense Resources The World in 2050 Reported by Business Insider
  • 26. We will have the ability to rely almost exclusively on renewable, clean energy • World Wildlife Fund report: 95% energy supplied by clean energy cutting greenhouse emissions 80%  Solar provide half of the world's electricity/half of building heating/15% industrial heat and fuel  Additional Wind Turbines: million onshore and 100,000 offshore (float on water)  Ocean power: waves and tides  Biomass: plant materials and animal waste  Geothermal derived from the Earth's crust  Hydropower Cars could be vastly safer, smarter, and cleaner • Driverless cars safer by eliminating human error, which causes 90% of car accidents--Milken Institute.  4.95 million fewer accidents, 30,000 fewer deaths, and 4.8 billion fewer commuting hours  Save Americans $500 billion per year in costs of car accidents, fuel, and lost productivity • Electric cars will also be widespread totaling 157 million electric cars and light trucks  Worldwide annual production 7 million by 2020 and 100 million by 2050-- Enel, Italy's largest power company o Reduce CO2 emissions from transportation by 30% o Significantly reducing oil consumption Greater gender equality will improve the global economy and society • Women’s productivity losses fall to just 4% of world GDP • Households run with no more gender bias, children raising included • IN 1900 Loss of 17% GDP due to Women’s lower pay and exclusion from the work sector Almost all adults will know how to read • Experts estimates that illiteracy rates will fall to just 12% and cost only about 3.8% of GDP There may be much less warfare worldwide • ARMED CONFLICTS DOWN 15% from 2009 and only with 7% of countries o India, Nigeria, Sudan, Ethiopia, and Tanzania will be at the greatest risk of armed conflict in 2050 o factors like education, infant mortality, past conflicts, oil, ethnicities, and youth population Cyber Defense Resources 2050:THE PROMISE LAND The World in 2050 Reported by Business Insider
  • 27. The internet will reach every corner of the world (Possible Government Intervention) • More than 8 billion people will go online, 97.5% of the population --The World We Made Forum Jonathon Porritt • 2018: 40% of the globe has internet access, with 78% of users in developed countries and 32% in developing countries. That's about 2.85 billion people, many of whom get internet access from mobile phones • Google's Project Loon and Internet.org specifically focus on bringing the web to areas where people don't yet have it Artificial body parts could make organ shortages a thing of the past • Who won't have to wait for another person to die before getting a life-sustaining organ • The technology for lab-grown bladders can also be combined with 3D printing of a person's own stem cells to make organ rejection a thing of the past. This process involves growing stem cells in the lab after removing them from a patient, then planting them into the 3D-printed body part. The cells grow on the scaffolding, creating an organ compatible with the recipient Baby-making will become more sophisticated along with Designer Babies • Genetic engineering can make sick children healthy by removing or replacing diseased genes • Perfect children eliminate crooked teeth or bad eyesight • Create super humans choosing genes to improve IQ, height, hair color, eye color , sex New translation tools will CLOSE GLOBAL COMMUNICATION GAPS • By wearing a pair of special goggles or using a phone app • Microsoft unveiled a "Star Trek"-like demo for real-time translation over Skype 2050:THE PROMISE LAND Cyber Defense Resources The World in 2050 Reported by Business Insider
  • 28. “1984” IS FINALLY 2018 GETTING CHPPED: OMG! Monitoring or firing people who break the rules. A bored or distracted worker is not necessarily non- productive. Control of this type already exist in companies such as Crossover. Supervisors constantly evaluate each ten-minute work period of their team using monitoring tools such as WorkSmart compiling statistics on the applications and websites each contractor has opened, the time spent on them, keystrokes and mouse movements. Every 10 minutes, randomly and without warning, a photo is taken by webcam and saved. More than 1,500 people in 80 countries are monitored in this way, with the company paying for time it considers used to the companies fullest benefit. Facial Recognition: Feds catch person enter U.S. illegally Biometrics Facial Recognition: Gather demographic data on crowds for retail marketing industry. Banking apps (USAA), payment apps (MasterCard’s video selfie system) The bank is the first large American financial institution to offer facial recognition as an option for accessing its mobile app, which lets users check their balance, make deposits, view statements and reach customer service representatives. Globally, law enforcement biometric software identify faces in CCTV footage and specialized sun glasses. St. Mary’s Catholic secondary school in St. Louis uses biometric cameras to keep campuses safe. Cyber Defense Resources
  • 29. Security Robots Market to Witness Huge Growth by 2023: Key Players– Knightscope, Endeavor Robotics, Lockheed Martin, IRobot The Global Security and Law Enforcement Robots Market will grow by over USD 2.36 billion during the period 2017-2022. including unmanned Aerial, Ground and Underwater vehicles, border patrolling and bomb detection, and security and law enforcement robots manufacturers including Boston Dynamics, Endeavor Robotics, Lockheed Martin, and SMP Robotics. Key Companies: RoboteX, Knightscope, Endeavor Robotics, Lockheed Martin, IRobot, Northrop Grumman, BAE Systems PLC, Thales SA, Elbit Systems, Qinetiq Group PLC, Finmeccanica SPA & Aerovironment. Application: Airport, Warehouse, Bank, Pavilion & Other, Product Type: , Indoor Type Security Robots & Outdoor Type Security Robots. Cyber Defense Resources
  • 30. Flexible Ultra-Thin Organic Optoelectronics – for displays, photovoltaics & wearable sensors – is at the verge of large-scale commercialisation, with prototype devices already achieving staggering form factors and bending curvatures. Lasers on the eye – ocular lasers – New development of an ultra-thin membrane laser using organic semiconductors. For new applications in security, biophotonics & photomedicine. Each membrane is able to produce a unique "barcode” like a wearable security tag. • Engineers in Scotland developed laser for the eyes NEW Ultra-thin Membrane Laser Using Organic Semiconductors Cyber Defense Resources
  • 31. Evidence Link Between Schizophrenia, Violent Crime Schizophrenia: brain disease with neural deficiencies: incapable of intimacy or remorse. Typically controlling and hiding behind a false image. Researchers at Stanford turned blood cells into neurons, the building blocks of central nervous system & of the brain Patients with this disease either have damaged or absent neuro-anatomical structures They live in an altered state of reality. We can complete this shape-shifting transformation of one cell type into another by adding just four specific proteins—which we determined play vital roles in brain development—to freshly drawn or stored blood cells. These four factors are enough to rapidly reprogram these cells and transform them into neurons within a few weeks of treatment. Could We Prevent Crime in the Future? Cyber Defense Resources
  • 32. Caltech Scientists Can Predict Intelligence from Brain Scans MINORITY REPORT: Could We Prevent Crime in the Future? Neuroscientists at the California Institute of Technology (Caltech) have conducted the most comprehensive brain mapping to date of the cognitive abilities measured by the Wechsler Adult Intelligence Scale (WAIS), the most widely used intelligence test in the world. The results offer new insight into how the various factors that comprise an "intelligence quotient" (IQ) score depend on particular regions of the brain. All of the patients had some degree of cognitive impairment from events such as strokes, tumor resection, and traumatic brain injury, as assessed by testing using the WAIS Cyber Defense Resources
  • 33. Please donate to the recovery of victims from Con Artists Robin Austin robinmaustinceo@gmail.com Download my book: “Truth Will Out; Love, Larceny and Vindication from gofundme.com/truth-will-out-recovery Cyber Defense Resources