2. The Top 10 IoT Segments in 2018
– based on 1,600 real IoT projects
Source: IoT Analytics, The Top 10 IoT Segments in 2018 – based on 1,600 real IoT projects.
Cyber Defense Resources
IoT Analytics
3. THERE IS A DISCONNECT:
FAILURE Security Strategy For IoT Deployments
When Asked These Are the Top Concerns
Cyber Defense Resources
4. TRUTH IS HARD TO SWALLOW
• Businesses Cyber breaches almost doubled in 5 yrs.
– from 68 per business in 2012
– to 130 per business in 2017
– 36 stopped by law enforcement successes in 2010–2012
• Resurgence: “dark net” markets for malware goods &
services
– 37 in 2016 alone
– 357 million new malware variants were released
• “banking trojans” designed to steal account login details
could be purchased for as little as US$500.38
• Cyber criminals have an exponentially increasing number
of potential targets, because the use of cloud services and
IoT devices
Cyber Defense Resources
5. 2016 Bug Bounty Hacker Report Seen a Success
• April 2016: U.S. FEDs launched Department of Defense’s Hack
• Shortly after: Pentagon followed with U.S. Army, U.S. Air Force & GSA
• May 2017: Technology Transformation Service (GSA) and IRS
• Next: U.S. Senators introduced Fed. Bug Bounty Program for DHS
• Followed by: U.K. announced a vulnerability disclosure policy pilot
• Next: DOJ quietly released guidelines so you can design your own
software vulnerability disclosure programs
– To avoid legal issues traditionally caused when a hacker remotely accesses
a computer system without prior consent
– Because confidential information on internal “bugs” affecting a
company’s own systems or products can complicate Computer
Fraud and Abuse Act, or CFAA, which has been applied in different
court cases in a variety of conflicting ways.
BUGemot
Cyber Defense Resources
6. HackerOne
Since 2013, over 800 programs have launched
ABOUT HACKERONE:
• #1 bug bounty vulnerability disclosure platform
• Largest community of ethical hackers
• Collectively paying out $17 million in cash
• 50,000 security vulnerabilities fixed & rendered
unexploitable
Cyber Defense Resources
7. IoT TOP PATENT HOLDERS:
Samsung, Qualcomm, LG, Huawei, and Intel
Cyber Defense Resources
9. IoT “CHIP” Security Challenges
1. Gaps in technical sophistication
2. Standards are absent or immature
3. Customers view IoT security as a commodity
4. Semiconductor companies struggle to profit from security
Cyber Defense Resources
11. What makes each IoT device special is also
what makes it vulnerable. They are tiny,
and normally only possess enough
intelligence to perform a single function.
That’s why they can fit almost anywhere.
But unfortunately, given our current
technology, that does not leave a lot of
room for things like memory, processors or
any good way to increase computing power.
If you try to add power to an IoT device,
you end up also increasing its size, power
requirements, heat generation and other
factors. At some point, it’s no longer an IoT
device, and can’t perform its role as one.
Because of size and processor constraints,
most IoT devices have no security at all.
Others like web cameras ship with basic
password protection, which is better than
nothing, but then users forget to change
the default passwords, leaving the device
vulnerable to a simple attack.
I have recently reviewed IoT programs that
are designed to protect IoT by installing
them behind a dedicated frontend system.
Manufacturers have little interest in adding
native security. Home users won’t have
access to enterprise-level cybersecurity
platforms.
The National Institute of Standards and Technology believes it has the answer
and is trying to work with industry and even individuals to develop standards
for lightweight encryption. This is a project that NIST began quite some time
ago, back in 2013 to be exact. But it has taken this long, and several workshops,
to get the Lightweight Cryptographic Project to a point where we can almost
start deploying the kinds of protection that IoT needs, and that we need from
our IoT.
Cyber Defense Resources
12. The list price for a new Tesla Powerwall 2.0 battery,
which offers twice the storage capacity of the original
Powerwall, is $5,900. Supporting hardware adds
another $700 to the equipment costs, bringing the
total to $6,600. Installation can add anywhere from
$2,000 to $8,000 to the final bill.
Distributed
Battery
Storage Will
Surpass
Grid-Scale
Storage in
the US by
2020
Cyber Defense Resources
13. A Thai-based
renewable energy
technology company,
Energy Absolute, plans
to invest $3 billion in
battery gigafactory.
The plant is expected to
be larger than Japanese
electronics maker
Panasonic's 35GWh
factory for US electric
car maker Tesla in the
state of Nevada.
Energy Absolute also
plans to set up 1,000
charging stations for
electric cars in Bangkok
and elsewhere by the
end of the year, before
moving to the battery
market.
Cyber Defense Resources
TECHNOLOGY RENEWABLE
ENERGY INVESTMENT
14. The Hidden Cost of the Electric Car Boom – Child Labor
Some of the most significant developments in the electric car market are likely to come from China, where the
market for electric vehicles grew by 72% last year, with 94% of that market owned by domestic manufacturers. Car
ownership rates less than a quarter of those in Europe, the demand for electric vehicles in China looks set to explode.
A critical raw material in lithium-ion battery production, cobalt is in high demand. It is needed to power
smartphones, tablets, and laptops as well as electric vehicles, but it is the latter where astronomical growth risks
perpetuating misery. Dangerous working conditions, risks to people’s health, and child labor is a huge problem in the
cobalt mines of the Democratic Republic of the Congo (DRC).
Two-thirds of the world’s cobalt is found in the DRC, which is one of the world’s poorest and least
developed countries with a gross national income per capita of just $481.
Cyber Defense Resources
15. 43 Battery Storage Companies To Watch
• ABB: One of the largest power and automation companies in the world, and focused on cleantech. It offers
distributed energy storage modules for grid storage purposes, such as peak shaving, load shifting voltage
regulation, renewable integration, and backup power.
• AESC: Automotive Energy Supply Corporation is one of three “leaders” in the electric vehicle (EV) battery
space, according to a Navigant Research report on the market. Being in the EV battery space, it (naturally)
produces lithium-ion batteries, using lithium manganate as the cathode.
• AES Energy Storage: Although AES has been in the energy business for 30 years, this certainly doesn’t mean
that they aren’t worth keeping an eye on for the upcoming year. This market leader has the largest fleet of
grid batteries in commercial service and received a notable award in November 2014 of a 20-year contract
with Southern California Edison of 100 MW of interconnected battery energy storage. AES partners with
industry-leading utilities and power system operators on energy storage projects.
• Alevo: popped out of a long stealth mode in 2014 and is bringing the “first inorganic lithium battery” to the
commercial market. It’s near the top of the list here thanks to the alphabet and choice of name, but it’s also
one of the most promising-looking companies on the list, imho. It is targeted at the grid storage market.
• Ambri: Spun out of MIT and developing liquid metal battery technology for the past few years. It has an initial
factory in place.The batteries are targeted for stationary storage applications.
• Amprius: develops high-capacity lithium-ion batteries that originated at Stanford University. Investors
include Trident Capital, VantagePoint Capital Partners, IPV Capital, Kleiner Perkins Caufield & Byers, SAIF
Partners, Chinergy Capital, Google Chairman Eric Schmidt, and Stanford University. Former Secretary of
Energy Steven Chu sits on the board.
• Aquion Energy: Aqueous hybrid ion battery technology boasts “long cycle life at 100% depth of discharge for
long duration (4 to 20 hour) applications.”
• Bosch: It may not be Bosch’s signature product, but the technology giant is offering energy storage and
related technology and service solutions, particularly in connection with solar and wind power installations.
Cyber Defense Resources
16. In 2017 Samsung Electronics’
technology institute, Samsung
Advanced Institute of Technology
(SAIT), had developed a core battery
technology which used graphene to
deliver longer operating times and
faster charging. The graphene ‘balls’
are said to boost battery capacity by
45%, whilst making the rate at which
the battery charges five times faster
than current standards
A university in CHINA nanopolymer
laboratory reported that after 250,000
instances of charging, the graphene-
based battery retained 91% of its
capacity, as well as remaining stable
under extreme temperatures
Cyber Defense Resources
Samsung, appears to have discovered
the holy grail of commercial graphene
production:
17. • BlackBerry is back with Cloud-based Security Platform for IoT (01/2015)
– Collaboration platform for application developers & business partners initially for
automotive sector soon to extend to energy and healthcare.
– Blockchain Smartphone
Cyber Defense Resources
18. A Need for Due Diligence
• The recent hype to raise funds for blockchain projects
brought charlatans with fraudulent intentions onto the
scene
• Cryptocurrency (token based finance) is a haven for criminals
• There must be oversight to create legitimacy.
• This need for more scrutiny also applies to impact tokens.
We believe that it is important to establish and apply criteria
that allow impact investors to assess the integrity of an
impact token and its ability to channel funds to enable
desired impact outcomes.
Freely accessible open-source code is the
foundation upon which the decentralized
economy of the future will be built.
Cyber Defense Resources
19. Where Does Blockchain Go From Here For
Impact Tokens and Sustainable Energy?
• As shown, blockchain is a game-changing technology that can contribute
to scale impact investment by providing trust, transparency and low
transaction costs.
• However, it is early days for impact tokens, and the impact investment
community needs to be prepared for a trial and error approach. As
demonstrated by the complex establishment of the carbon market –
arguably the world’s first large-scale payment-for-impact schemes – the
first priority must be in developing trust, and thus to build consensus
around processes and procedures in the community.
• Only by broad cooperation within the interested community, and the
willingness to commit to common standards, can impact tokens reap the
potential advantages provided by blockchain technology, and ultimately
lead to unlocking of finance at scale to achieve the Sustainable
Development Goals.
Cyber Defense Resources
20. Blockchain, A Solution For Counterfeiting in Semiconductor Industry
Photo credit: SparkFunElectronics via Visual hunt
According to the Semiconductor Industry
Association, counterfeits cost U.S.
semiconductor companies more than $7.5
billion annually in lost revenue. But, more
importantly, counterfeit components pose
major threats to the health, safety, and
security of people worldwide.
With this system, the only way to provide 100 counterfeit components is to own another
100 real components of the same manufacturing part number and the same date code.
However, if you sell the 100 counterfeit components, you will no longer be able to prove
that the real ones are real. Counterfeiters will be out of business. If all buyers request their
transactions in bitcoins then you won’t be able to sell the real ones. Of course, you can still
use the real ones for your own production but manufacturers are not counterfeiters.
100% safe, viable and robust.
Cyber Defense Resources
21. • California Governor Jerry Brown
has signed a cybersecurity law
covering “smart” devices, making
California the first state with such
a law. The bill, SB-327, was
introduced last year and passed
the state senate in late August.
• Starting on January 1st, 2020, any
manufacturer of a device that
connects “directly or indirectly” to
the internet must equip it with
“reasonable” security features,
designed to prevent unauthorized
access, modification, or
information disclosure. If it can be
accessed outside a local area
network with a password, it needs
to either come with a unique
password for each device, or force
users to set their own password
the first time they connect. That
means no more generic default
credentials for a hacker to guess.
California: First State with an Internet of Things (IoT) Cybersecurity Law
Cyber Defense Resources
Recently it was discovered that Roku
and Samsung TVs could be hacked and
wirelessly controlled in a second, and
there was also that brief phase where
Amazon’s Alexa was letting off a
creepy laugh. Not to mention the
incident in the Netherlands when a
woman was being stalked through an
internet-connected camera in her
living room.
22. Frey Effect
EMR & RF NOW
2B Carrageenan
Same as DDT
Today the International
Journal of Oncology published
a critique of the World Health
Organization's pending review
of the adverse health effects
of wireless (i.e., radio
frequency or RF) radiation.
The critique was written by Dr.
Lennart Hardell, the world's
preeminent researcher on
brain tumor risk and long-term
cell phone use.
Cyber Defense Resources
CYBER WAR
During the Cold War, the United States
feared that the Soviet Union was
seeking to turn microwave radiation into
covert weapons of mind control. More
recently, the U.S. military itself sought
to develop microwave weapons for
psychological warfare.
Strikes with microwaves are sonic
attacks creating brain damage,
viral infections and contagious
anxiety.
23. • In September 2017, a Russia-based
organization spent US$100,000 on
advertisements promoting divisive
political issues during the US
presidential campaign.
• Facebook said it would provide the ads
to congressional investigators
• Facebook has launched tools to make
all ads it runs publicly accessible
• In October 2017, Twitter announced it
would ban Russia Today (RT) and
Sputnik following the US intelligence
investigation positive findings.
• Twitter is launching an “Advertising
Transparency Center” that will
1. provide details about all ads
carried on its platform,
2. place clear visual markers on
political advertisements,
3. disclose how political ads are
targeted and
4. strengthen policies regarding
political advertising.
REOUTERS/baz
Moscow warns Google not to meddle in
elections Sept. 9, 2018 with YouTube videos
organized by opposition leader Alexei Navalny.
Russia’s Central Election Commission, the
Prosecutor-General’s Office and Roskomnadzor,
the government’s internet and media
watchdog, sent complaints to Google boss
Larry Page in response to Mr. Navalny’s videos.
“Mr. Navalny buys the company’s advertising
tools to publish information on YouTube on the
day of elections,” commission member
Alexander Klyukin said. “We informed Google
that such events on election day will lead to
massive violation of the law,” Mr. Klyukin told
reporters, adding: “Meddling by a foreign
company in our election is not permitted.”
WHERE DOES FREEDOM OF
SPEECH END AND SAFETY
AND SECURITY BEGIN?
Cyber Defense Resources
24. 1. Climate change will be insanely expensive.
2. Hundreds of millions of people may be displaced by 2050.
3. Dengue and malaria could spread in the U.S.
4. Western wildfires could burn up to eight times as much land by 2100.
5. An additional 8% of the world population will experience water scarcity by 2100.
6. Hurricanes could become up to 11% more intense and 20% wetter by 2100.
7. Four times as many New Yorkers could live in areas that flood by 2050.
8. Millions of people and trillions in assets are at risk in coastal cities.
9. 136 of the world's most historic places could be in jeopardy.
10. Global wheat and maize yields are already beginning to decline.
11. Some small island nations could be destroyed.
12. 100% of reefs may be at risk of extinction by 2050.
13. Within 300 years, 88% of New Orleans could be underwater
14. Increasing droughts will make the driest regions even drier.
15. 63% of major wine regions could be jeopardized by 2050.
16. Some reptiles species could turn mostly female, potentially leading to their extinction
17. Atlanta and New York could see twice as many days of thunderstorms a year by 2100.
18. Many countries are losing their main dry season water source.
19. Air Pollution in California could created a serious public health hazard.
20. Equatorial regions and parts of the Antarctic will see up to a 50% decrease in their fisheries.
21. Some animals are shrinking.
22. An additional 20 million more children will go hungry by 2050.
DOOM
AND
GLOOM
for 2050
Cyber Defense Resources
The World in 2050
Reported by
Business Insider
25. Life in the Robotic/Digital Age by 2050
Child mortality rates will be vastly lower.
• The Copenhagen report predicts the rate dropping to 31 per 1,000 live births in 2050
• More dramatic declines in regions like Africa.
We'll have vaccines and cures for many diseases.
• HIV: kills anywhere from 1.5 million to 2 million people
• Malaria: kills 1 million people a year
• British-bred genetically modified mosquitoes causing parasite to self-destruct
• Alzheimer's: reversing Alzheimer's could be available in five years.
PREVENTION: Given to patients whose families have a history of Alzheimer's
• Meningitis: U.S. vaccine that other countries will soon adopt
• Cancer: A rheumatoid arthritis drug cured a now 7 year old of life threatening cancer.
A modified measles vaccine caused cancer remission. Nanoparticles developed to attack cancer
stem cells Cancer Vaccines Teach the immune system to attack cancer directly
Humans could live forever as computerized brains
• Neuroscientist Randal Koene and Russian financial-backer Dmitry Itskov "mapping the brain” are trying to transfer
human consciousness and brain functions to an artificial body by 2045
There will be no more poor countries
• 700 million fewer people lived in extreme poverty in 2010 than in 1990
• Extreme poverty was defined as $1 day in 1990, was redefined as $1.25 a day in 2008
World Bank lowered extreme poverty to no more than 3% of the population by 2030
• Global climate change is threatening the homes and livelihoods of Panama and a once fishing community in England
Artificial intelligence will be insanely good
• Hans Moravec of Carnegie Mellon University's Robotics Institute predicts that by 2050 robots will outperform
humans both physically and intellectually and will run entire businesses by themselves.
• Humans will pursue social (emotional relationships) recreational and artistic creative pursuits
• “Work” will take on a new meaning with Guaranteed Minimum Income guranteed eradicating poverty
THE
PROMISE
LAND 2050
Source: Business Insider
Cyber Defense Resources
The World in 2050
Reported by
Business Insider
26. We will have the ability to rely almost exclusively on renewable, clean energy
• World Wildlife Fund report: 95% energy supplied by clean energy cutting greenhouse emissions 80%
Solar provide half of the world's electricity/half of building heating/15% industrial heat and fuel
Additional Wind Turbines: million onshore and 100,000 offshore (float on water)
Ocean power: waves and tides
Biomass: plant materials and animal waste
Geothermal derived from the Earth's crust
Hydropower
Cars could be vastly safer, smarter, and cleaner
• Driverless cars safer by eliminating human error, which causes 90% of car accidents--Milken Institute.
4.95 million fewer accidents, 30,000 fewer deaths, and 4.8 billion fewer commuting hours
Save Americans $500 billion per year in costs of car accidents, fuel, and lost productivity
• Electric cars will also be widespread totaling 157 million electric cars and light trucks
Worldwide annual production 7 million by 2020 and 100 million by 2050-- Enel, Italy's largest power company
o Reduce CO2 emissions from transportation by 30%
o Significantly reducing oil consumption
Greater gender equality will improve the global economy and society
• Women’s productivity losses fall to just 4% of world GDP
• Households run with no more gender bias, children raising included
• IN 1900 Loss of 17% GDP due to Women’s lower pay and exclusion from the work sector
Almost all adults will know how to read
• Experts estimates that illiteracy rates will fall to just 12% and cost only about 3.8% of GDP
There may be much less warfare worldwide
• ARMED CONFLICTS DOWN 15% from 2009 and only with 7% of countries
o India, Nigeria, Sudan, Ethiopia, and Tanzania will be at the greatest risk of armed conflict in 2050
o factors like education, infant mortality, past conflicts, oil, ethnicities, and youth population
Cyber Defense Resources
2050:THE
PROMISE
LAND
The World in 2050
Reported by
Business Insider
27. The internet will reach every corner of the world (Possible Government Intervention)
• More than 8 billion people will go online, 97.5% of the population --The World We Made Forum Jonathon Porritt
• 2018: 40% of the globe has internet access, with 78% of users in developed countries and 32% in developing
countries. That's about 2.85 billion people, many of whom get internet access from mobile phones
• Google's Project Loon and Internet.org specifically focus on bringing the web to areas where people don't yet have it
Artificial body parts could make organ shortages a thing of the past
• Who won't have to wait for another person to die before getting a life-sustaining
organ
• The technology for lab-grown bladders can also be combined with 3D printing of a
person's own stem cells to make organ rejection a thing of the past. This process
involves growing stem cells in the lab after removing them from a patient, then
planting them into the 3D-printed body part. The cells grow on the scaffolding,
creating an organ compatible with the recipient
Baby-making will become more sophisticated along with Designer Babies
• Genetic engineering can make sick children healthy by removing or replacing diseased genes
• Perfect children eliminate crooked teeth or bad eyesight
• Create super humans choosing genes to improve IQ, height, hair color, eye color , sex
New translation tools will CLOSE GLOBAL COMMUNICATION GAPS
• By wearing a pair of special goggles or using a phone app
• Microsoft unveiled a "Star Trek"-like demo for real-time translation over Skype
2050:THE
PROMISE
LAND
Cyber Defense Resources
The World in 2050
Reported by
Business Insider
28. “1984” IS FINALLY 2018
GETTING CHPPED: OMG! Monitoring or firing people who break
the rules. A bored or distracted worker is not necessarily non-
productive. Control of this type already exist in companies such
as Crossover. Supervisors constantly evaluate each ten-minute
work period of their team using monitoring tools such as
WorkSmart compiling statistics on the applications and websites
each contractor has opened, the time spent on them, keystrokes
and mouse movements. Every 10 minutes, randomly and without
warning, a photo is taken by webcam and saved. More than 1,500
people in 80 countries are monitored in this way, with the
company paying for time it considers used to the companies
fullest benefit.
Facial Recognition: Feds catch person enter U.S. illegally
Biometrics Facial Recognition: Gather demographic data on
crowds for retail marketing industry.
Banking apps (USAA), payment apps (MasterCard’s video
selfie system) The bank is the first large American financial
institution to offer facial recognition as an option for accessing its
mobile app, which lets users check their balance, make deposits,
view statements and reach customer service representatives.
Globally, law enforcement biometric software identify faces in
CCTV footage and specialized sun glasses.
St. Mary’s Catholic secondary school in St. Louis uses
biometric cameras to keep campuses safe.
Cyber Defense Resources
29. Security Robots Market to Witness Huge Growth by 2023: Key
Players– Knightscope, Endeavor Robotics, Lockheed Martin, IRobot
The Global Security and Law
Enforcement Robots Market will
grow by over USD 2.36 billion
during the period 2017-2022.
including unmanned Aerial,
Ground and Underwater
vehicles, border patrolling and
bomb detection, and security
and law enforcement robots
manufacturers including Boston
Dynamics, Endeavor Robotics,
Lockheed Martin, and SMP
Robotics.
Key Companies: RoboteX,
Knightscope, Endeavor
Robotics, Lockheed Martin,
IRobot, Northrop Grumman,
BAE Systems PLC, Thales SA,
Elbit Systems, Qinetiq Group
PLC, Finmeccanica SPA &
Aerovironment.
Application: Airport, Warehouse, Bank,
Pavilion & Other, Product Type: , Indoor Type
Security Robots & Outdoor Type Security
Robots.
Cyber Defense Resources
30. Flexible Ultra-Thin Organic Optoelectronics – for displays, photovoltaics
& wearable sensors – is at the verge of large-scale commercialisation,
with prototype devices already achieving staggering form factors and
bending curvatures.
Lasers on the eye – ocular lasers – New development of an ultra-thin
membrane laser using organic semiconductors. For new applications in
security, biophotonics & photomedicine.
Each membrane is able to produce a unique "barcode” like a wearable
security tag.
• Engineers in Scotland developed laser for the eyes
NEW Ultra-thin Membrane Laser Using Organic Semiconductors
Cyber Defense Resources
31. Evidence Link Between Schizophrenia, Violent Crime
Schizophrenia: brain disease with neural deficiencies:
incapable of intimacy or remorse.
Typically controlling and hiding behind a false image.
Researchers at Stanford turned blood cells
into neurons, the building blocks of central
nervous system & of the brain
Patients with this disease either have damaged
or absent neuro-anatomical structures
They live in an altered state of reality.
We can complete this shape-shifting transformation of one cell
type into another by adding just four specific proteins—which
we determined play vital roles in brain development—to freshly
drawn or stored blood cells. These four factors are enough to
rapidly reprogram these cells and transform them into neurons
within a few weeks of treatment.
Could We Prevent Crime in the Future?
Cyber Defense Resources
32. Caltech Scientists Can Predict Intelligence from Brain Scans
MINORITY REPORT: Could We Prevent Crime in the Future?
Neuroscientists at the California Institute of
Technology (Caltech) have conducted the most
comprehensive brain mapping to date of the
cognitive abilities measured by the Wechsler
Adult Intelligence Scale (WAIS), the most
widely used intelligence test in the world. The
results offer new insight into how the various
factors that comprise an "intelligence
quotient" (IQ) score depend on particular
regions of the brain.
All of the patients had some degree of cognitive
impairment from events such as strokes, tumor
resection, and traumatic brain injury, as assessed by
testing using the WAIS
Cyber Defense Resources
33. Please donate to the recovery of
victims from Con Artists
Robin Austin
robinmaustinceo@gmail.com
Download my book: “Truth Will Out; Love,
Larceny and Vindication from
gofundme.com/truth-will-out-recovery
Cyber Defense Resources