{"id":1400,"date":"2016-03-25T12:00:33","date_gmt":"2016-03-25T11:00:33","guid":{"rendered":"http:\/\/www.free-and-safe.org\/?page_id=1400"},"modified":"2022-08-30T09:34:39","modified_gmt":"2022-08-30T07:34:39","slug":"backgrounder-live","status":"publish","type":"page","link":"https:\/\/www.free-and-safe.org\/backgrounder-live\/","title":{"rendered":"Backgrounder on the 4 Challenges"},"content":{"rendered":"\t\t
How can we build and certify IT systems that are radically more secure than state-of-the-art?\n<\/br>\n\nRead more >><\/a><\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t If we can solve Challenge A, how can we concurrently solidly ensure legitimate lawful access?\n<\/br>\nRead more >><\/a><\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Can ultra-high assurance IT and related certification governance models radically increase the security, privacy or safety of complex and critical IT, AI and cyber-physical systems, such as for example self-driving cars, robo-advisors, or even Facebook?\n<\/br>\nRead more >><\/a><\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t What governance models can best maximize the trustworthiness and resilience of an ultra-high assurance certifications body in critical IT and AI domains?\n<\/br>\nRead more >><\/a><\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t The World is rapidly turning into a Hacker\u00a0<\/strong>Republic<\/strong>, where economic and political power increasingly accrues to those state and non-state actors with the most informational and hacking superiority<\/strong> in critical political, enterprise, financial\u00a0and autonomous IT systems.<\/p> The situation is nothing short of catastrophic, with\u00a0even the most secure IT systems can be undetectably compromised by even\u00a0often mid-level attackers and increasingly<\/b> so<\/b> – even those used by top executives<\/span><\/strong>, presidential candidates<\/span><\/strong>, and by critical civilian and military infrastructure<\/span><\/strong>.\u00a0Though cybersecurity spending has grown 30 times in the last 10 years to $120 billion per year, the cost of\u00a0<\/span>cybercrime is skyrocketing accruing to $8 trillion by 2022.<\/span>\u00a0Not to mention the cost to our ordinary and active citizens<\/span><\/strong>\u00a0rights democratic institutions<\/span><\/strong>, which seem held at ransom from state and non-state groups, each accusing the other.<\/span><\/p> A recent\u00a0PwC<\/span><\/span><\/strong>\u00a0survey highlighted how “investors see cyberthreat as the main obstacle to enterprise growth<\/span>. The CEO of IBM<\/span><\/strong> stated that “Cybersecurity has become the greatest threat to any company in the World<\/i>\u201d.<\/p> Most\u00a0enterprises<\/span><\/span>\u00a0are spending more and more for the security of their critical IT systems, and awareness is fast emerging \u2013 via scandals like\u00a0Spectre and Meltdown<\/a>\u00a0and\u00a0CIA Vault 7<\/a>\u00a0\u2013 about how their most critical systems are scalably vulnerable to\u00a0even non-state mid-level attackers<\/span>\u00a0that too easily acquire access to state-grade hacking tools. While most internal hacks have remained undisclosed, the new\u00a0GDPR regulation<\/span>\u00a0will mandate from May 28th their disclosure within 72 hours, posing a great reputation and stock quotation damage.<\/p> Last year, the\u00a0German Minister of Defense\u00a0<\/span>identified cybersecurity as the \u201c<\/span>single greatest threat to global stability<\/i><\/span>\u201d. This is not surprising given the increasing vulnerability, complexity and lack of adequate standards for critical civilian and military systems, which makes their hacking attribution inherently very difficult to attribute. The inadequate standards, obscurity, hyper-complexity, and forensic-unfriendliness of even the most critical systems and processes, in fact, renders\u00a0cyber-incidents very difficult to attribute<\/span>\u00a0in an internationally recognized way as International Atomic Energy Agency and the International Criminal Court have enabled, at least partly, for nuclear and war crimes incidents.<\/p> Recent rulings of the\u00a0European Court of Justice<\/em>\u00a0have raised substantial doubts<\/a>\u00a0that most current western legislation, even when\u00a0they nominally respect citizens\u2019 rights,\u00a0are not supported\u00a0by implementation regulations or external standards or certification processes (e.g. Common Criteria, SOGIS, eIDAS, ETSI-LI, etc.) that provide\u00a0sufficient transparency, accountability and oversight\u00a0safeguards<\/strong>\u00a0to users with reasonable confidence of their compliance with\u00a0European Charter of Fundamental Rights<\/em>.<\/p> Meanwhile,\u00a0financial institutions<\/span><\/span>\u00a0are ever more victim of fraud and privacy abuse than their customers, with mounting cash and reputational costs. Their historical role, as providers of core trustworthy financial services, is being gravely threatened by\u00a0cryptocurrencies and blockchains<\/span>\u00a0\u2013 perceived as potentially safer and cheaper long-term stores of value \u2013 and by small and large competitors, unleashed by the EU Directive\u00a0PSD2<\/span>, who will be able to offer e-services \u201cover the top\u201d while claiming as much or higher trustworthiness than banks.<\/p> Are\u00a0key assets and capabilities of nations\u2019 law enforcement, defense and intelligence<\/span><\/strong>\u00a0themselves highly vulnerable to attackers\u00a0\u2013\u00a0foreign,\u00a0domestic and internal \u2013 due to the lack of sufficiently comprehensive,\u00a0translucent<\/em>\u00a0and accountable socio-technical standards, such as in IT\u00a0facility access<\/a>,\u00a0device\u00a0fabrication<\/a>\u00a0or\u00a0assembly<\/a><\/p> Our\u00a0democracies and politicians<\/span><\/span>\u00a0appear increasingly held for ransom by the best and most-resourced threat actors. Hacking of\u00a0electoral and primary democratic processes<\/span>, critical autonomous systems, and social media are fast becoming the military weapons of choice of nations willing to\u00a0subvert, subjugate and destabilize other nations<\/span>.\u00a0Military systems\u00a0are often no less vulnerable<\/span>, but less is publicly known since the most serious hacks become state secret when they happen.<\/p> But then, paradoxically, even though they can remotely compromise any computing device,\u00a0public security agencies<\/span><\/span>\u00a0are often unable to make such evidence stand in court, given for the inherent corruptibility of its means of acquisition —\u00a0as jointly\u00a0declared<\/a>\u00a0by the Ministers of Interior of Germany and France. Furthermore, the tools they use for targeted interception suffered many of the same vulnerabilities of secure enterprise solutions- as highlighted by the\u00a0Hacking Team<\/a>\u00a0and the\u00a0Inslaw Promis<\/a>\u00a0scandals.<\/p> How vulnerable are systems that\u00a0security-critical Artificial Intelligence system providers<\/span><\/strong> are promising to deploy in large scale in the near future, movable and otherwise, to attacks via their critical socio-technical low-level subsystems?\u00a0We may not\u00a0even have a\u00a0chance of\u00a0achieving\u00a0levels of safety\u00a0and security assurance that are sufficient for a\u00a0sustainable<\/em>\u00a0wide-market deployment of\u00a0advanced and critical AI systems<\/strong>, such as autonomous\u00a0movable vehicles, unless their most\u00a0low-level<\/em>\u00a0critical<\/em>\u00a0components and chips are subject to radically unprecedented levels of assurance.<\/p><\/figure>
Challenge B:\u200b<\/h3>
<\/figure>
Challenge C:\u200b<\/h3>
<\/figure>
Challenge D:\u200b<\/h3>
general<\/span> \n\nbackgrounder<\/span><\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t