Categories
GeekWire

Anduril expands to Seattle for defense tech

Anduril HQ
One of Anduril’s sentry towers stands tall at the company’s HQ in California’s Orange County. (Anduril Photo)

Irvine, Calif.-based Anduril Industries says it’s opening a new office in Seattle and will be hiring engineers to work on defense technologies.

“We are building bigger and better systems for our military as quickly as we can,” Palmer Luckey, the venture’s founder, said in a news release. “The incredible pool of talent in the Seattle area helps us accelerate that.”

Founded in 2017, Anduril develops hardware and software centered around Lattice, an AI backbone allowing for real-time information analysis across the company’s range of products. Those products include a surveillance drone called the Ghost, an interceptor drone called the Anvil, medical transport drones and a border monitoring system that relies on sensor-equipped sentry towers.

Get the full story on GeekWire.

Categories
GeekWire

Echodyne raises $20M for next-gen radar systems

Echodyne radar system
Echodyne’s flat-panel radar antenna is small enough to be held in your hand. (Echodyne Photo)

Microsoft co-founder Bill Gates and other investors have contributed to a fresh $20 million funding round for Kirkland, Wash.-based Echodyne, a company that makes use of exotic metamaterials to build high-performance radar technology for government and commercial markets.

In today’s announcement, Echodyne said the additional capital will enable the company to meet growing demand for its EchoGuard 3D surveillance radar, expand its distribution channels and continue to invest in the development of sensors for commercial drones, autonomous vehicles and other applications.

The latest round’s other investors include firms that have previously backed Echodyne, including Madrona Ventures, NEA, Vulcan Capital and Lux Capital. But there’s a new backer on board as well: Vanedge Capital, which is based in Vancouver, B.C. Vanedge managing partner Moe Kermani will be added to Echodyne’s board of directors.

Get the full story on GeekWire.

Categories
GeekWire

Amazon patents drone surveillance as a service

Drone surveillance plan
A diagram shows how Amazon’s patented geofencing arrangement would zero in on a potential break-in while screening out a view of the house next door. (Amazon Illustration via USPTO)

Amazon has patented a system for providing home security surveillance as a service, but the real innovation has to do with avoiding surveillance of the home next door.

Just don’t expect to sign up for the service, or freak out over it, anytime soon.

For one thing, Amazon patents lots of ideas that never see the light of day. (Remember Jeff Bezos’ airbag-equipped smartphone?) For another, the newly published patent sprang from an application that was filed four years previously — and Amazon’s strategy for drone operations as well as security services has almost certainly evolved since 2015.

A big roadblock to surveillance drones is that the Federal Aviation Administration is still working out the regulations regarding commercial drone flights in neighborhoods — particularly when the flights are done autonomously, beyond the operator’s line of sight. (Even drone surveillance of industrial facilities such as railyards can spark controversy.)

The patent application, attributed to inventors Kalidas Yeturu and Howard Lee Huddleston Jr., calls for making use of the drones that Amazon is developing for package deliveries.

Get the full story on GeekWire.

Categories
GeekWire

How IoT could bring hackers into your kitchen

Internet of Things and the cloud
Pixabay Illustration

WASHINGTON, D.C. — Tens of billions of devices, ranging from coffee makers to cars to spacecraft, could someday be connected to global networks thanks to what’s known as the Internet of Things, or IoT, and cybersecurity experts say that could open up a whole new universe for hackers and eavesdroppers.

Consider the humble coffee maker, for example: University of North Carolina techno-sociologist Zeynep Tufekci suggested that if Chinese authorities wanted to, say, root out Muslim activists in the country’s far western Xinjiang region, they could watch for the telltale sign of coffee or tea being brewed before morning prayers.

“Your coffee maker has an IP [address], and it might be at risk of identifying these people, because if I wanted one piece of data from the region, that would be my thing. … It’s a very synchronized hour, that’s the whole point of it,” Tufekci said here last weekend during the annual meeting of the American Association for the Advancement of Science.

“Holy crap, we were just talking about coffee making, right? And now we’re talking about taking people to send to internment camps,” she said. “These lines are not as far apart from one another as one would think.”

Get the full story on GeekWire.

Categories
GeekWire

Could airport drone disruption happen here?

Drone test
A drone flies over a New York test site. (NUAIR Alliance Photo via NASA / Eric Miller)

Hundreds of flights have been canceled and tens of thousands of airline passengers have been stranded because of the buzz of unauthorized drones over London’s Gatwick Airport — demonstrating how disruptive a simple aerial strategy can be.

Military forces have been called up to hunt down the elusive drone operator, and the crisis has prompted calls to tighten up flight restrictions near Britain’s airport. But on that score, U.S. airports appear to be in a better position to guard against drone disruption.

British regulations call for a no-drone zone within 1 kilometer (0.6 miles) of an airport’s perimeter, while the Federal Aviation Administration restricts drone flights in a five-mile radius around airports such as Seattle-Tacoma International Airport.

In more sensitive areas, such as the National Capital Region around Ronald Reagan Washington National Airport, restrictions are in force within a much wider radius — ranging from 15 to 30 miles, depending on the type of activity.

Sea-Tac spokesman Perry Cooper told GeekWire that the airport’s operations team hasn’t had any reports of drone incidents, and that it works in collaboration with the FAA on drone monitoring.

The FAA, meanwhile, says that it works with the Department of Homeland Security, the lead agency in drone security issues.

In October, language written into FAA reauthorization legislation gave Homeland Security and the Justice Department the authority to counter the use of drones for “nefarious purposes.”

Get the full story on GeekWire.

Categories
GeekWire

NASA reviews security after data breach

Pleiades supercomputer network
NASA’s computer servers include the Pleiades supercomputer network. (NASA Photo)

NASA says it is reviewing its network security processes and procedures after a computer break-in exposed Social Security numbers and other personal information about the space agency’s current and past employees.

The breach was discovered in October, and its full extent and impact has yet to be determined. NASA says it will provide identity protection services to all those who have potentially been affected.

NASA Watch, an independent website founded by former NASA employee Keith Cowing, first brought the incident to light in a posting on Dec. 18 that quoted an internal NASA memo. The memo suggests that agency employees who were hired, transferred or left NASA between July 2006 and October 2018 may be affected.

Get the full story on GeekWire.

Categories
GeekWire

New crypto needed for quantum computing age

Quantum computing report
A new report from the National Academies says it’ll be at least a decade before quantum computing becomes powerful enough to crack today’s public-key cryptography, but it could also take that long to develop a new data-encoding system to protect against hacking. (National Academies Illustration)

new report from computer scientists estimates that it’s likely to be at least a decade before quantum computing tools become powerful enough to compromise the current system of public-key cryptography that serves as the foundation for data security and financial transactions.

But it could also take a decade or more to replace current crypto tools with new protocols that would be resistant to quantum hacking, according to the report, published today by the National Academies of Science, Engineering and Medicine.

Therefore, the report’s authors say, it’s urgent to begin the transition toward such “post-quantum” protocols — which can range from increasing the size of encryption keys to developing new lattice-based systems such as NewHope and Frodo.

The study was sponsored by the federal Office of the Director of National Intelligence, and meshes with policy strategies laid out in September during a White House quantum information science summit. Like the White House strategy document, the National Academies study points out that the rise of quantum computing will have deep implications for national security.

Get the full story on GeekWire.

Categories
GeekWire

Battleground shifts in fight over fake news

National Guard at work
Staff Sgt. Wiggin Bernadotte, a cyber warfare operator in the Washington Air National Guard’s 262nd Cyberspace Operations Squadron, works with Capt. Benjamin Kolar, a cyberspace operations officer in the 262nd, on an electrical substation simulator. The exercise is part of the Air National Guard’s effort to help secure and protect voting systems on Election Day. (JBLM / DVIDS / DOD Photo / Paul Rider)

Facebook and Twitter have been cracking down on political disinformation during the current election cycle, but there are signs that the fight against fake news has spread to new battlefields, ranging from LinkedIn to text messages.

In Washington state, the Air National Guard has called out its cyberspace operations unit to protect the voting system. And the battle won’t end when the votes are tallied.

“Be aware of the ‘voter fraud’ debate that will inevitably follow the election — no matter the results,” University of Washington information scientist Jevin West, one of the instructors for a “Calling B.S.” class that went viral, told GeekWire in an Election Day email.

Get the full story on GeekWire.

Categories
GeekWire

Online-only voting? Don’t do it, experts say

Electronic voting
Experts say electronic voting systems need to generate a voter-verifiable paper audit trail. (U.S. State Dept. Photo)

Chastened by Russian interference and hacking attempts in the 2016 election, academic experts on voting technology say electronic voting machines that don’t leave a paper trail should be phased out as soon as possible.

“Every effort should be made to use human-readable paper ballots in the 2018 federal election,” the experts write in a report issued today by the National Academies of Science, Engineering and Medicine. “All local, state and federal elections should be conducted using human-readable paper ballots by the 2020 presidential election.”

That’s already the case for Washington, Oregon and Colorado, where mail-only voting has become the norm. (The report notes that “vote-by-mail” is something of a misnomer, since most ballots are still returned by hand. “Ballot delivery by mail” comes closer to the mark.)

Washington’s election officials have implemented the report’s top recommendation for mail-voting systems: giving voters an easy way to check whether their ballot has been sent, and where their returned ballot is in the system. The “MyVote” websitelinks to online ballot trackers as well as voter registration information.

Get the full story on GeekWire.

Categories
GeekWire

Security strengthened at Sea-Tac after plane theft

Port of Seattle news briefing
Port of Seattle Commissioner Courtney Gregoire takes questions during a briefing at Seattle-Tacoma International Airport. (Port of Seattle via YouTube)

Security measures have been stepped up at Seattle-Tacoma International Airport, including the maintenance area where a ground support worker commandeered an empty plane for an unauthorized, and ultimately fatal, flight on Friday.

“You’ll see that increased presence,” Courtney Gregoire, president of the Port of Seattle Commission, said today at an informal Sea-Tac news briefing, “and we’ll keep monitoring what we need there.”

Gregoire didn’t go into detail about the nature of the security measures taken in air cargo areas. The Horizon Air plane, a Bombardier Q400 turboprop, had been parked for maintenance in one of those areas, known as Cargo 1, when airline employee Richard Russell took it out for an unauthorized flight.

Get the full story on GeekWire.