Connect with us

Technology

Shield AI’s founder on death, drones in Ukraine, and the AI weapon ‘no one wants’

Published

on

Shield AI cofounder Brandon Tseng

About two months ago, Shield AI co-founder Brandon Tseng and one of his employees were in an Uber weaving through Kyiv, Ukraine. They were headed to a meeting with military officials to sell them on their AI pilot systems and drones, when suddenly his employee showed him a warning on his phone. Russian bombs were incoming. Tseng met his potential demise with a shrug. “If it’s your time to go,” he said, “then it’s your time to go.” 

If anything, Tseng, a former Navy SEAL, was itching for more action. Shield AI employees had previously been to much more dangerous areas in Ukraine, training troops on its software and drones. “I’m quite jealous of where they got to go,” Tseng said. “Just from an adventure standpoint.”

Tseng embodies that quiet macho-ness that pervades most defense tech founders. When I met him last month at the company’s Arlington office, he showed off a knife displayed in his office engraved with the SEAL slogan “Suffer in silence.” The white walls, whose tops glowed with fluorescent lights (to look like a spaceship, Tseng said), were covered with slogans like “Do what honor dictates” and “Earn your shield every day.” I pointed out they were pretty intense. “Are they?” Tseng replied.  

In 2015, Tseng founded Shield AI alongside his brother, Ryan Tseng, a patent-awarded electrical engineer, with a clear mission: “We built the world’s best AI pilot,” he said. “I want to put a million AI pilots in customers’ hands.” 

Advertisement

To that end, he and his brother have raised over $1 billion from investors like Riot Ventures and the U.S. Innovative Technology Fund. The company develops AI software to make air vehicles autonomous, although Tseng said they want Shield AI’s software in underwater and surface systems as well. It also has hardware products, like its drone V-BAT. 

Shield AI is also part of a rare class of defense tech startups: one that’s actually landed decently sized government contracts, like its $198 million contract from the Coast Guard this year. As if trying to position themselves for an even bigger future, the founders chose a new office surrounded by three floors of Raytheon, one of the major defense contractors. 

Ukraine: The lab for U.S. defense tech startups

September 16 was a sign of the changing times: Instead of making defense tech founders fly to the Capitol, put on their suits, and grovel to politicians, Washington, D.C., came to them. 

Members of the U.S. House Armed Services Committee gathered with Palantir CTO Shyam Sankar, Brandon Tseng, and executives from Skydio, Applied Intuition, and Saildrone at UC Santa Cruz’s Silicon Valley campus. They discussed U.S. Department of Defense (DoD) acquisition reform and, inevitably, the role of U.S. technology in Ukraine. It was the first public hearing the committee has held outside of Washington, D.C., since 2006.

Advertisement

Ukraine has “been a great laboratory,” Tseng told the policymakers. “What I think the Ukrainians have discovered is that they’re not going to use anything that doesn’t work on the battlefield, period.”

Defense tech founders, like Anduril co-founder Palmer Luckey and Skydio co-founder Adam Bry, have all flocked to the embattled country to sell relatively new technology for a rapidly deteriorating battlefield. Unfortunately, not all U.S. tech is working. According to a Wall Street Journal report, drones from U.S. startups have almost universally failed to operate through electronic warfare in Ukraine, meaning the drones cease to work under Russia’s GPS blackout technology.

“Ukraine is at war and people are being killed. But … you want to take those lessons learned,” Tseng told me a week later, reflecting on the hearing. “You don’t want to have to relearn any of those lessons. The United States should not want to relearn any of those lessons.”

Naturally, he’s confident that Shield AI’s drones have fared better in Ukraine than others because, he says, they can operate without relying on GPS. “We are working to get more drones over there based on the successes that we’ve had,” he said, although he declined to name specifics of how many drones Shield AI has sent over. 

Advertisement

Terminator-like AI killers? Or ‘Ender’s Game’?

Tseng’s corner office is bare besides a framed copy of the Declaration of Independence, hanging crooked on the wall. He listed it as one of his biggest inspirations. “It’s not because we’re perfect, but because we aspire to these values that I would claim are perfect values,” he said. “That’s what matters most. We’re always marching in that direction.” 

He straightened out the frame before brushing through an abbreviated history of warfare. Deterrence, he said, tends to happen when a radical new technology emerges, like the atom bomb, or stealth technology and GPS. AI, he said, will usher in the new era of deterrence — assuming the DoD funds it properly. “Private companies are putting more money towards AI and autonomy than any aggregate amount in the defense budget,” he said. 

The potential value of AI-related federal contracts ballooned to $4.6 billion in 2023 from $335 million in 2022, according to a report by the Brookings Institution. But that’s still a fraction of the over $70 billion that VCs invested in defense tech in roughly the same period, according to PitchBook.

Still, the biggest question of military AI use is not budget — it’s ethics. Founders and policymakers alike grapple with whether to allow completely autonomous weapons, meaning the AI itself decides when to kill. Lately, some founders’ rhetoric appears to be on the side of building such weapons.

Advertisement

A few days ago, for instance, Anduril’s Luckey claimed there was “a shadow campaign being waged in the United Nations right now by many of our adversaries” to trick Western countries into not aggressively pursuing AI. He implied that fully autonomous AI was no worse than land mines. He didn’t mention, however, that the U.S. is among over 160 nations that agreed to ban the use of anti-personnel land mines in the vast majority of places.

Tseng is firmly opposed to fully autonomous weapons. “I’ve had to make the moral decision about utilizing lethal force on the battlefield,” he said. “That is a human decision and it will always be a human decision. That is Shield AI’s standpoint. That is also the U.S. military’s standpoint.” 

He’s right that the U.S. military does not currently purchase fully autonomous weapons, although it does not ban companies from developing them. What if the U.S. changed its standpoint? “I think it’s a crazy hypothetical,” he answered. “Congress doesn’t want that. No one wants that.” 

So if he doesn’t foresee an army of Terminator-like killers, what does he envision? “A single person could command and control a million drones,” Tseng said. “There’s not a technological limitation on how much a single person could command effectively on the battlefield.”

Advertisement

It’s going to be akin to “Ender’s Game,” he said, referencing the 1985 sci-fi classic where a child military officer can release legions of space armies with the wave of a hand. 

“Except instead of actual humans that he was commanding, it’ll be f—ing robots,” Tseng said.

Source link

Advertisement
Continue Reading
Advertisement
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Servers computers

Lenovo SR670 V2 flyby showing the server jam packed full of eight NVIDIA A40 GPUs.

Published

on

Lenovo SR670 V2 flyby showing the server jam packed full of eight NVIDIA A40 GPUs.

source

Continue Reading

Technology

NIS2 & DORA: Staying ahead of the curve

Published

on

NIS2 & DORA: Staying ahead of the curve

With less than a month away before the updated landmark Network and Information Security (NIS2) Directive deadline, organizations across the EU are preparing for the new regulation to come into full force on the 17th October. However, it doesn’t stop there. On the 17th January 2025, the new Digital Operational Resilience Act (DORA) will also come into effect for financial organizations and the sector’s third-party IT suppliers.

Organizations across the EU, and those based elsewhere that do business with the region’s entities, are facing increasing pressure to align with these regulatory requirements. The convergence of these frameworks looks to impact over 170,000 European organizations in total — with 150,000 organizations affected by the NIS2 and estimates suggesting over 22,000 financial entities and ICT service providers impacted by DORA.

Simon Fisher

What are NIS2 and DORA?

Source link

Continue Reading

Technology

NYT Mini Crossword today: puzzle answers for Friday, October 11

Published

on

NYT Mini Crossword today: puzzle answers for Saturday, September 21

The New York Times has introduced the next title coming to its Games catalog following Wordle’s continued success — and it’s all about math. Digits has players adding, subtracting, multiplying, and dividing numbers. You can play its beta for free online right now. 
In Digits, players are presented with a target number that they need to match. Players are given six numbers and have the ability to add, subtract, multiply, or divide them to get as close to the target as they can. Not every number needs to be used, though, so this game should put your math skills to the test as you combine numbers and try to make the right equations to get as close to the target number as possible.

Players will get a five-star rating if they match the target number exactly, a three-star rating if they get within 10 of the target, and a one-star rating if they can get within 25 of the target number. Currently, players are also able to access five different puzzles with increasingly larger numbers as well.  I solved today’s puzzle and found it to be an enjoyable number-based game that should appeal to inquisitive minds that like puzzle games such as Threes or other The New York Times titles like Wordle and Spelling Bee.
In an article unveiling Digits and detailing The New York Time Games team’s process to game development, The Times says the team will use this free beta to fix bugs and assess if it’s worth moving into a more active development phase “where the game is coded and the designs are finalized.” So play Digits while you can, as The New York Times may move on from the project if it doesn’t get the response it is hoping for. 
Digits’ beta is available to play for free now on The New York Times Games’ website

Source link

Advertisement
Continue Reading

Servers computers

Data Rack Move using a set of our Hydraulic Lifters

Published

on

Data Rack Move using a set of our Hydraulic Lifters



A half rack and quarter rack both at around 250 kg each and without castors, relocated from Amsterdam to Slough. Moved using our hydraulic lifters (just like skoots) .

source

Continue Reading

Technology

Protecting your web app from unauthorized access

Published

on

Protecting your web app from unauthorized access

By making use of robust authentication and authorization, web apps can effectively mitigate the all-too-common risks associated with unauthorized intrusions.

Authentication confirms the identity of users accessing the system while authorization further restricts user actions based on their roles, minimizing potential vulnerabilities within the application.

Regularly updating security measures and educating developers about their importance play crucial roles in maintaining a secure environment.

Understanding web security fundamentals

Web application security is critical if your goal is to protect sensitive data and keep the trust of your userbase.

Advertisement

Security measures should evolve over the course of time to counteract the latest threats. Putting in place the latest best practices helps prevent or ameliorate potential breaches that could very well have severe financial and reputational impacts.

Companies often decide to hire penetration testing companies for the express purpose of uncovering vulnerabilities. Conducting these tests on a regular basis — once or twice per year allows businesses to stay in lockstep with emerging threats. Emphasizing security in the development lifecycle ensures that measures are integral rather than an afterthought.

Common web security threats

In many web applications, vulnerabilities like SQL injection and cross-site scripting (XSS) are prevalent —these threats exploit poor input validation, allowing attackers access to vital information. Developers should prioritize input sanitization to prevent such attacks.

Cybersecurity threats evolve rapidly. The rise of complex attacks necessitates ongoing vigilance. Security threats can disrupt services and compromise data integrity. Staying informed about common threats is vital for implementing timely defenses in web app development.

Advertisement

Principles of secure web design

Designing with security in mind involves adhering to key principles. Inputs should be thoroughly validated, and sensitive data encrypted to prevent unauthorized access. Utilizing parameterized queries reduces the risk of SQL injection.

Another principle is the concept of least privilege, where users and applications are granted only the necessary permissions. This minimizes the damage potential if access is compromised. Security frameworks should be integrated into the design process, ensuring a strong foundation for robust web applications.

Authentication and access control measures

Methods such as multi-factor authentication (MFA) enhance protection by requiring users to provide two or more separate verification factors — while this is slightly more time-consuming, the slight hassle does pay off. This makes it more difficult for anyone unauthorized to gain access. Furthermore, integrating authentication based on tokens also adds an extra layer of security, as tokens are unique and time-sensitive, reducing the risk of session hijacking.

Furthermore, regular monitoring of authentication logs can help identify unusual access patterns. Input validation during the login process ensures that data entered by users satisfies predefined criteria, preventing attacks like SQL injection.

Advertisement

Utilizing role-based access control

Role-based access control (RBAC) is a paradigm based on assigning permissions to employees based on what their role within an organization is. This tends to make management simpler — by grouping users with similar responsibilities and assigning specific access rights to these groups. This system ensures that sensitive information and functionalities are only accessible to roles that require them.

By clearly defining roles and permissions, organizations can reduce the risk of data breaches. For effective RBAC implementation, regularly updating role assignments and conducting audits are essential. Automated tools can assist in managing roles and permissions, ensuring smooth operations, and minimizing administrative overhead. Such measures enhance security by ensuring users have access only to necessary resources.

Making use of the principle of least privilege

The principle of least privilege is a vital security measure. It limits user access to the minimum level necessary to perform their job functions, thereby mitigating security risks.

It operates on a simple basis — all users are granted the least amount of access required to do their duties, reducing the potential impact of any one account being compromised.

Advertisement

Regularly reviewing and adjusting user privileges helps maintain effective security. It’s crucial to revoke unnecessary privileges promptly. Implementing controls to monitor user actions assists in maintaining compliance with this principle.

Defending against common web attacks

Web applications face numerous threats that can compromise data integrity and user privacy. Guarding against these threats involves adopting specialized strategies focusing on every type of attack.

Protecting against injection attacks

Injection attacks involve injecting malicious code into a web application to manipulate its database. A prevalent example is SQL injection, which targets database layers by injecting SQL commands.

To defend against these, developers should implement parameterized queries and stored procedures, which limit user input from altering queries in harmful ways.

Advertisement

Regular use of a web application firewall helps to detect and block suspicious activities. Last but not least, the utilization of input validation is yet another crucial measure, ensuring that user inputs adhere to expected formats and content types.

Defending against cross-site scripting (XSS)

Cross-site scripting, or XSS attacks, consist of malicious actors injecting client-side scripts into the web pages that are afterward viewed by other users.

This can lead to unauthorized access to user sessions and the exposal of sensitive information. Utilizing content security policies (CSP) can stop browsers from executing such types of malicious scripts. On top of that, encoding data sent to a web browser ensures that the data is treated as text, not as executable code. Developers can also sanitize inputs by escaping data before processing it or displaying it.

Preventing cross-site request forgery (CSRF)

Cross-site request forgery tricks a user into executing unwanted actions on a web application where they are authenticated. Protecting against CSRF involves the use of anti-forgery tokens, which ensure that requests originate from legitimate users.

Advertisement

Session management and secure cookies are also critical, helping to maintain secure user sessions and reduce vulnerabilities. To bolster security, developers can also leverage mobile security features that ensure consistent protection across devices. Addressing these aspects minimizes the likelihood of CSRF attacks compromising web applications.

Encryption and secure data handling

Ensuring that you fully secure sensitive information by encrypting it and managing it carefully is vital to preventing unauthorized access.

Implementing SSL/TLS for Secure Communication

SSL/TLS protocols play a key role in protecting data exchanges between a server and its users, encrypting interactions to deter interception and manipulation. Websites should adopt HTTPS to maintain data privacy and ensure that information stays intact while in transit.

Advertisement

To implement SSL/TLS, a business must go about acquiring a certificate from a trusted Certificate Authority — this certificate acts as a vote of confidence for the server and assures users that communication is encrypted. Without SSL/TLS, applications are susceptible to risks, such as interception attacks, which could compromise sensitive data.

Data encryption and document access

Data encryption protects sensitive information at rest, whether in a database or during document access. Implementing strong encryption algorithms ensures data security.

For document handling, especially PDFs, digital signatures can be employed to verify authenticity and integrity. Utilization of various software development kits helps seamlessly integrate signing capabilities within applications, ultimately securing your app’s users.

Secure session management

Session management involves securely handling session tokens and IDs to prevent unauthorized access to user accounts. Proper secure session management ensures that tokens are randomly generated and stored securely.

Advertisement

Key practices include:

– Using secure cookies with the HttpOnly and Secure flags,
– Ensuring that session IDs are changed upon user login and logout,
– Limiting session duration with appropriate expiration times.

To prevent session hijacking, it’s recommended that developers use tools and software development kits capable of integrating robust session management features. Proactively managing these sessions ensures ongoing security for users’ data.

Conclusion

Strong authentication methods should be prioritized. Making the use of multi-factor authentication and strong access controls a priority and standard company policy can go a long way in the effort to reduce the risk of such unwanted access.

Advertisement

Regular security updates and patches play a vital role in mitigating vulnerabilities. Implementing these strategies creates a robust defensive perimeter that enhances the overall security posture of a web application. By being proactive and vigilant, organizations can safeguard sensitive data and maintain user trust.

Featured image source

Source link

Advertisement
Continue Reading

Servers computers

Cisco UCS Server, new Datacenter

Published

on

Cisco UCS Server, new Datacenter

source

Continue Reading

Trending

Copyright © 2024 WordupNews.com