Page 3,446«..1020..3,4453,4463,4473,448..3,4603,470..»

AFP says it made three requests for assistance in breaking encryption in 2019-20 – iTWire

The Australian Federal Police has told the Parliamentary Joint Committee on Intelligence and Security that it has used technical assistance requests issued under the encryption law passed in December 2018 on three occasions in the financial year 2019-20, to obtain assistance from companies or individuals in breaking encryption to gain access to information needed for investigation of crimes.

Under the law, which is officially known as the Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, technical assistance requests seek voluntary help by a company; its staff will be given civil immunity from prosecution.

If this is not agreed to by the company in question, an interception agency can then issue a technical assistance notice or TAN to make a communications provider offer assistance based on existing functionality.

If this is not effective either in convincing the organisation in question to co-operate with law enforcement, then a technical capability notice can be issued by the Attorney-General at the request of an interception agency.

In a submission to the PJCIS, the AFP said as per previous submissions and appearances before the panel and in the review of the law by the Independent National Security Legislation Monitor, Dr James Renwick, the tempo and complexity of the criminal threat environment was evolving with increasing use of technology by criminal groups and their networks, to facilitate and obfuscate criminal conduct.

The AFP said the encryption law provided an essential framework to strengthen the AFPs ability to overcome technological impediments to lawful access to digital content, where necessary and appropriate.

For the previous financial year, the AFP said it had used the technical assistance requests on five occasions. This was in a much shorter period than the full 12 months, as the law came into effect only in December 2018; hence the period over which these five TARs were made was from December 2018 to 30 June 2019, a little more than six months.

This repositioning of our promotional stories has come about due to customer focus groups and their feedback from PR firms, bloggers and advertising firms.

Your Promotional story will be prominently displayed on the Home Page.

We will also provide you with a second post that will be displayed on every page on the right hand side for at least 6 weeks and also it will appear for 4 weeks in the newsletter every day that goes to 75,000 readers twice daily.

POST YOUR NEWS ON ITWIRE NOW!

These days our customers Advertising & Marketing campaigns are mainly focussed on Webinars.

If you wish to promote a Webinar we recommend at least a 2 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://www.itwire.com/itwire-update.html and Promotional News & Editorial.

For covid-19 assistance we have extended terms, a Webinar Business Booster Pack and other supportive programs.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

More:
AFP says it made three requests for assistance in breaking encryption in 2019-20 - iTWire

Read More..

Exorcist Ransomware and CIS Exclusion – Security Boulevard

This year has been a bumper year for ransomware and its operators. Ransomware gangs are demanding millions; if those millions are not paid in time, then data stolen before encryption is either released to the public or sold to the highest bidder. Big names in the cybercriminal underground have returned with an entirely new ransomware familynamely Evil Corp and its new creation WastedLocker. Not only is there a return to form for old hands, but new ransomware strains also seem to be bursting up like mushrooms after a spell of rain. NetWalker and Exorcist immediately come to mind. The latter is the subject of this article.

Discovered in late July by MalwareHunterTeam, the Exorcist ransomware is so new to the scene that information on it had been incredibly sparse. That was until Leandro Velasco published an article shedding much of the codes mysteryand in great depth. The article is a must-read for anybody wanting a technical analysis of the ransomware. In providing a brief overview of Exorcist, it seems to be distributed via a Pastebin PowerShell script that runs in memory. The script takes from lessons learned by Sodinokibi affiliates and is based on the Invoke-ReflectivePEInjection.ps1 script, further optimized to include a function that passes a base64 executable into the main function of the script. It is also possible that the script is generated by the no-longer-supported Empire framework.

The code itself is not obfuscatedwhile common practice with other types of malware, it is often not deemed necessary for ransomware by its developers. Part of the reason for this is that the encryption process is in itself very noisy and once that begins, any pretense of stealth is quickly forgotten and speed is the main requirement. Some ransomware strains do obfuscate their code, but it is not an unwritten rule that all malware be obfuscated.

The malwares first operation is to check the geolocation of the infected machine, which is done by checking the language and keyboard layout of the machine in question. If the result is any of the nations that make up the Commonwealth of Independent States (CIS)which includes many of the nations that made up the Eastern Block during the Cold War and now still have close ties to Russiathe malwares operations are immediately stopped. Why this is done is discussed in greater depth in the second part of this article.

Screenshot of a ransom demanding message displayed by Exorcist ransomware:

If the geolocation check returns a nation not making up a part of the CIS, the ransomware executes several commands that disable and remove system backups. The commands will also look to terminate any system processes that may prevent encryption of certain file types. This is followed by the malware writing the public encryption key and the private key, as well as the file extension used to disk. Before encryption occurs, the malware will extract information including the username, hostname, OS version and keyboard layout and send those to a server under the attackers control. Once this is complete encryption begins utilizing multiple threads to drastically decrease the time to encrypt data. Finally, the wallpaper of the system is changed and the ransom note is dropped.

If you feel that you may have suddenly become a victim of Exorcist, there are a few tell-tale signs. First, the wallpaper announcing youve become a victim reads as follows:

ENCRYPTEDREAD decrypt.htafile for details

When the ransom note is opened it will read:rnyZoV DecryptAll your data has been encrypted with Exorcist Ransomware.Do not worry: you have some hours to contact us and decrypt your data by paying a ransom.To do this, follow instructions on this web site: hxxp://217.8.117.26/payAlso, you can install Tor Browser and use this web site: hxxp://4dnd3utjsmm2zcsb.onion/payIMPORTANT: Do not modify this file, otherwise you will not be able to recover your data!

Your authorization key:

An authorization key will be provided by the attacker once the ransom is paid. However, to find out what the ransom is the victim needs to download a Tor browser and visit the address provided. It is unclear if the ransom amount is fixed at 5000 USD in Bitcoin or changes from victim to victim, depending on what the attacker perceives they can pay. The website reads as follows:Exorcist RansomwareOrderIf the payment isnt made until 2020-07-25 10:33:57, decryptor price will be increased 3 times

Whats the matter?All your files have been encrypted with Exorcist Ransomware.

The only way to decrypt them back is to buy Exorcist Decryption Tool.

The price is 5000$

It will scan all your network and check all encrypted files and decrypt them.

We accept Bitcoin (BTC) cryptocurrencies.

To be sure we have the decryptor and it works you can use Free Decrypt and decrypt only one file for free. But the only file you can decrypt is image (PNG, JPG, BMP), maximum size 3 MB, because they are usually not valuable.

Instruction:You need to create a crypto wallet. You can read more about crypto wallets here: hxxps://bit.ly/379vYBtLearn how to buy cryptocurrency (Bitcoin). Some links where you can find information here:Bitcoin: hxxps://bit.ly/38nohHMCopy the wallet number from the address field (depending on what you have chosen) and transfer the necessary amount of cryptocurrency to it. You can read more about translations here: hxxps://bit.ly/36br2dKAfter paying the ransom, your files will be decrypted and you will be able to continue your work.

IMPORTANT: When transferring funds, carefully check the details to avoid errors and loss of funds. Your files will be decrypted only when transferring funds to our wallet.

Free decrypt

PaymentDecryptor price: 5000$Pay in Bitcoin:bc1qyzjj2hrjr3sspjwj9ckd02fz8kmynj9xkjrkgv0.561799 BTCWhen funds reach one of these addresses, you automatically get decryption tool.

ChatType Message

Performing a search at the time of writing on the provided address in the ransom note reveals that no funds have been transferred to this address as of yet. Given how new the ransomware is, this is not a surprise. Further, no victims have announced publicly that they have fallen victim to Exorcist to the best of this writers knowledge. It may be that Exorcist has not seen wide distribution yet, as it may still be in development or slowly ramping up operations.

While there seem to be no active campaigns making headlines at the moment, this is probably not likely to last. One bit of news that emerged recently is that a hacker released a list of IP addresses for more than 900 Pulse Secure VPN enterprise servers. The list published in plaintext also included several usernames and passwords. The release was made on a Russian underground hacker forum, which is known to have multiple ransomware gangs contributing and actively posting. The list includes Sodinokibi, NetWalker, Lockbit, Avaddon, Makop and importantly for the purposes of this article Exorcist. In general, the forum is used by the gangs to hire more developers or affiliates tasked with distributing the ransomware.

The reason why the dump of Pulse Secure VPN credentials would make headlines is that many of the above-mentioned gangs have actively been targeting known vulnerabilities in VPNs to compromise an enterprise network. As the dump was done free of charge and in plain text, those using unpatched VPN products should be worried enough to patch them as a matter of priorityit may be that in the near future major enterprises will be seeing the Exorcists wallpaper and ransom note and be visiting their website.

The main reason why the developers behind Exorcist and several other malware families tend to not want to infect computers in Russia, its neighbors, and the countrys interest in the geopolitical stage is that the Russian government turns a blind eye to cybercrime conducted by nationals, as long as Russia and its interests are not targeted. This is why a quick internet search will reveal cybercriminals wanted in the U.S. or Europe posing in front of luxury cars bought with the proceeds from their criminal activity.

Further, it seems to be the case that rather than bringing these people to justice, Russian Intelligence will employ their expertise to supplement their own cyber warfare and cyber espionage operations. These rumors began some 20 years ago and recent events seem to prove they were closer to reality, further supported by skilled coders in the CIS and their earning potential. For many, it is far more lucrative to hack and be approached by the intelligence agencies in question than to work within the IT sector. Since immunity seems to be granted to hackers as long as they leave Russian interests alone, becoming a hacker seems to be more of a logical financial decision than the perceived view by most of society as hackers being social pariahs.

This scenario was further confirmed in 2019 when the Russian government passed laws that enabled the creation of a self-contained internet modeled after the one implemented successfully in China. A report published investigating the new law and its expected effects believed that the law would help further flame the flames of cybercrime, whether state-sponsored or independent, financially motivated hackers, and further the status quo mentioned above. The funny thing is the law would make it easier to crack down on hackers within Russian borders; however, attacks on Russias rivals such as the U.S. are seen as serving Russian interests even if done by cybercriminals.

An article about the relationship between the Russian government and its hackers, as well as hackers in neighboring states, concluded:

The availability of highly skilled and technically well-versed individuals also presents a pool of potential proxies that can be mobilized at a moments notice. Often, people will mobilize themselves and take political action in support of the government, as has happened in Estonia in 2007 and in Ukraine since 2014. Governments differ in their ability to catalyze such activity and the extent to which they are in a position to merely endorse, orchestrate, or actively direct their outcomes. In countries where public institutions and the states ability to exercise control have deteriorated, it is an uphill battle to break the increasingly entrenched incentive structures reinforcing existing proxy relationships. Meanwhile, the controversy over law enforcement cooperation, including mutual legal assistance and extradition, shows the limits of international cooperation and external influence. The phenomenon described in this chapter is therefore a cautionary tale of the potential pitfalls when a state significantly weakens or collapses and the consequences that will reverberate for decades to come.

For those tasked with defending networks against Exorcist and other ransomware gangs, expecting those who committed the crime to be arrested and brought to book is a pipe dream. Rather, the focus should be to do everything possible to prevent the attack in the first place.

Recent Articles By Author

Read the original here:
Exorcist Ransomware and CIS Exclusion - Security Boulevard

Read More..

Comprehensive Analysis on Endpoint Encryption Software Market based on types and application – The Daily Chronicle

The Endpoint Encryption Software market study Added by Market Study Report, LLC, provides an in-depth analysis pertaining to potential drivers fueling this industry. The study also encompasses valuable insights about profitability prospects, market size, growth dynamics, and revenue estimation of the business vertical. The study further draws attention to the competitive backdrop of renowned market contenders including their product offerings and business strategies.

The recent report on Endpoint Encryption Software market is an in-depth documentation of various dynamics at play in the industry space. As per the report, Endpoint Encryption Software market is poised to amass substantial revenues while growing with a y-o-y growth rate of XX% over the forecast period.

Request a sample Report of Endpoint Encryption Software Market at:https://www.marketstudyreport.com/request-a-sample/2829607?utm_source=thedailychronicle.in&utm_medium=Ram

Insights pertaining to growth drivers, challenges, restraints, and opportunities prevailing in the industry sphere are detailed in the report, alongside their impact on the overall market size. The report further analyzes the market based on different segmentations and highlights the aftermath of COVID-19 pandemic on the industry sphere.

Unveiling the topographical frame of Endpoint Encryption Software market:

Report Objectives:

Ask for Discount on Endpoint Encryption Software Market Report at:https://www.marketstudyreport.com/check-for-discount/2829607?utm_source=thedailychronicle.in&utm_medium=Ram

Other takeaways from Endpoint Encryption Software market report:

.

.

.

TOC of Endpoint Encryption Software Market Report Includes:

For More Details On this Report: https://www.marketstudyreport.com/reports/global-endpoint-encryption-software-market-2020-by-company-regions-type-and-application-forecast-to-2025

Read More Reports On: https://www.marketwatch.com/press-release/global-agricultural-inoculant-market-size-analytical-overview-growth-factors-demand-trends-and-forecast-to-2026-2020-08-05?tesla=y

Read More Reports On: https://www.marketwatch.com/press-release/multiphoton-microscopy-market-size-historical-growth-analysis-opportunities-and-forecast-to-2025-2020-08-04?tesla=y

Read More Reports On: https://www.marketwatch.com/press-release/machine-condition-monitoring-market-size-growth-rate-top-players-analysis-statistics-revenue-and-forecast-by-2027-2020-08-03?tesla=y

Read More Reports On: https://www.marketwatch.com/press-release/near-field-communication-chips-market-analysis-size-share-emerging-audience-business-opportunity-and-forecast-to-2027-2020-07-30

Contact Us:Corporate Sales,Market Study Report LLCPhone: 1-302-273-0910Toll Free: 1-866-764-2150 Email: [emailprotected]

Follow this link:
Comprehensive Analysis on Endpoint Encryption Software Market based on types and application - The Daily Chronicle

Read More..

Beyond Krk: Even more WiFi chips vulnerable to eavesdropping – We Live Security

At Black Hat USA 2020, ESET researchers delved into details about the Krk vulnerability in Wi-Fi chips and revealed that similar bugs affect more chip brands than previously thought

Krk (formally CVE-2019-15126) is a vulnerability in Broadcom and Cypress Wi-Fi chips that allows unauthorized decryption of some WPA2-encrypted traffic. Specifically, the bug has led to wireless network data being encrypted with a WPA2 pairwise session key that is all zeros instead of the proper session key that had previously been established in the 4-way handshake. This undesirable state occurs on vulnerable Broadcom and Cypress chips following a Wi-Fi disassociation.

Figure 1. Overview of Krk following a disassociation, data is transmitted encrypted with an all zero session key

Exploiting Krk allows adversaries to intercept and decrypt (potentially sensitive) data of interest and, when compared to other techniques commonly used against Wi-Fi, exploiting Krk has a significant advantage: while they need to be in range of the Wi-Fi signal, the attackers do not need to be authenticated and associated to the WLAN. In other words, they dont need to know the Wi-Fi password.

We worked with the affected vendors (as well as ICASI) through a responsible disclosure process before we first publicly disclosed the flaw at the RSA Conference in February 2020. The ensuing publicity brought the issue to the attention of many more chipset and device manufacturers, some of which discovered they also had vulnerable products and have since deployed patches. We are maintaining a list of related vendor advisories on this webpage[1].

While we did not observe CVE-2019-15126 in other Wi-Fi chips than Broadcom and Cypress, we did find that similar vulnerabilities affected chips by other vendors. These findings were first presented at Black Hat USA 2020 and were briefly outlining them below.

One of the chips we looked at, aside from those from Broadcom and Cypress, was by Qualcomm. The vulnerability we discovered (which was assigned CVE-2020-3702) was also triggerable by a disassociation and led to undesirable disclosure of data by transmitting unencrypted data in the place of encrypted data frames much like with Krk. The main difference is, however, that instead of being encrypted with an all-zero session key, the data is not encrypted at all (despite the encryption flags being set).

The devices we tested and found to have been vulnerable are the D-Link DCH-G020 Smart Home Hub and the Turris Omnia wireless router. Of course, any other unpatched devices using the vulnerable Qualcomm chipsets will also be vulnerable.

Following our disclosure, Qualcomm was very cooperative and in July released a fix to the proprietary driver used in their officially supported products. Not all devices with Qualcomm chips use this proprietary driver, however in some cases, open source Linux drivers are used such as the upstream ath9k driver, for example. As its not actively developed by Qualcomm, its not clear at the time of writing if it will receive a patch from Qualcomm or the open-source community.

We also observed the manifestation of a similar vulnerability (i.e. lack of encryption) on some Wi-Fi chips by MediaTek.

One of the affected devices is the ASUS RT-AC52U router. Another one is the Microsoft Azure Sphere development kit, which we looked into as part of our Azure Sphere Security Research Challenge partnership. Azure Sphere uses MediaTeks MT3620 microcontroller and targets a wide range of IoT applications, including smart home, commercial, industrial and many other domains.

According to MediaTek, software patches fixing the issue were released during March and April 2020. The fix for MT3620 was included in Azure Sphere OS version 20.07, released in July 2020.

As more than five months have passed since we publicly disclosed the Krk vulnerability and several proofs-of-concept have been published by independent researchers weve decided to release the script weve been using to test whether devices are vulnerable to Krk. We have also included tests for the newer variants described here. This script can be used by researchers or device manufacturers to verify that specific devices have been patched and are no longer vulnerable.

Special thanks to our colleague Martin Kalunk, who greatly contributed to this research.

[1] If you have an advisory you would like added to this list please contact us at threatintel[at]eset.com.

See the rest here:
Beyond Krk: Even more WiFi chips vulnerable to eavesdropping - We Live Security

Read More..

This hardware-encrypted USB-C drive is rugged, inexpensive, and can run Windows – TechRadar UK

Apricorn has released its new Aegis Secure Key 3NXC drive that features robust security, a rugged chassis, and a USB Type-C connector.

The ApricornAegis Secure Key 3NXCdrive, which is fast enough to run an operating system, features its own AES-XTS 256-bit encryption chip as well as a keypad to enter numerical PINs. At present, the storage device isFIPS 140-2 level 3 validation pending and the company expects to get it in Q3 2020.

The USB-C Aegis Secure Key 3NXC drive supports read-only mode for those who need to carry sensitive data and do not need to alter it anyhow as well as a read-write mode for those who may need to change the data on the drive or boot an operating system from it. Since encryption is hardware-based, it is seamless for OS and therefore the Aegis Secure Key 3NXC devices are compatible with virtually all operating systems available today, including Apples MacOS, Googles Android, Microsofts Windows, and even Symbian.

The firmware of the drive is locked down and cannot be altered by malware or exploits (e.g., BadUSB), which means that thedriveitself is secure. Furthermore, the drive has its own battery that charges when it is plugged to a host, so an unlock pin can be entered while the drive is not plugged.

The Aegis Secure Key 3NXC drive comes in an aluminum chassis and is IP68-rated against water and dust. It also comes in an enclosure for extra protection. Measuring 81mm x 18.4mm x 9.5mm, the device weighs 22 grams.

Apricorn, which specializes in hardware-encrypted storage devices, offers multiple versions of its Aegis Secure Key 3NXC drives featuring capacities ranging from 4GB to 128GB. The company does not disclose performance of the storage device and only mentions a 5Gbps theoretical throughput of a USB 3.2 Gen 1 interface, but higher-end Aegis Secure Key 3NXC are probably fast enough to boot an operating system in a reasonable amount of time.

There is one caveat with using Apricorns Aegis Secure Key 3NXC drive as a boot drive. Microsoft recentlycanned Windows To Goin Windows 10 Enterprise and Windows 10 Education (version 2004 and later) that enabled the creation of a Windows To Go workspace that could be booted from a USB drive. To that end, those who would like to use an Aegis Secure Key 3NXC to boot an OS will have to use an outdated version of Windows, or go with a Linux OS.

Apricorns Aegis Secure Key 3NXC drive are available directly from the company. A 4GB model costs $59 or 52.45, whereas a 128GB is priced at $179 or 159.13 depending where are you at. Considering the fact that the devices are aimed at various government and corporate personnel who have access to sensitive data as well as hardware encryption, metallic chassis, and other sophisticated features, prices of these drives look justified.

Source:Apricorn

Read more here:
This hardware-encrypted USB-C drive is rugged, inexpensive, and can run Windows - TechRadar UK

Read More..

Zoom’s COO is not concerned by app bans in India, says end-to-end encryption for all by year end – Economic Times

Aparna Bawa, COO, Zoom Video Communications; courtesy of Zoom.

Video-communications platform Zoom has remained under scrutiny in some countries, including India, over privacy. In an exclusive chat with ET Prime from San Jose, COO Aparna Bawa tries to dispel security concerns, assuring geofencing around China and pointing out paid users can even choose from Zooms 17 data centres globally. India, she says, is an incredibly important market.

Nasdaq-listed Zoom Video Communications is the new sensation in virtual communication, emerging as a formidable rival to established competitors such as Ciscos Webex, Microsofts Skype and Teams, Facebooks WhatsApp, and Slack. In India, it may well go on to match the massive impact WhatsApp has made over the years.Still, the video-conferencing giant has been haunted by its China connection in many corners of the globe. Meanwhile, India has

BY

AbcSmall

AbcMedium

AbcLarge

Access the exclusive Economic Times stories, Editorial and Expert opinion

Already a Member? Sign In now

Sharp Insight-rich, Indepth stories across 20+ sectors

Access the exclusive Economic Times stories, Editorial and Expert opinion

Clean experience withMinimal Ads

Comment & Engage with ET Prime community

Exclusive invites to Virtual Events with Industry Leaders

A trusted team of Journalists & Analysts who can best filter signal from noise

Read more from the original source:
Zoom's COO is not concerned by app bans in India, says end-to-end encryption for all by year end - Economic Times

Read More..

Jihadi Use Of Bots On The Encrypted Messaging Platform Telegram – Middle East Media Research Institute

Table of Contents

Introduction

A History Of Terrorist Bots On Twitter

The MEMRI JTTM Team: For Over Two Years, Monitoring Bots Spreading ISIS Content On Telegram

Creating Bots On Telegram

Jihadi Use Of Bots On The Encrypted Messaging Platform Telegram

Swearing Allegiance To ISIS

Discussing And Sharing Instructions For Online Security, Secure Communications, And Hacking

Sharing Information About Jihadi Channels, Archives, And Materials

Disseminating Warnings To Followers

Other Uses

Fundraising

Announcements Of New Bots And Requests For Distribution

Sharing Information About Jihadi Channels, Archives, And Materials

Sharing Information About Jihadi Channels, Archives, And Materials

Sharing Information On Training, Bombmaking, Weapons, And Recruiting

Introduction

Bots, or chatbots short for "chat robot" are computer programs that simulate human conversation "chat" through artificial intelligence.[1] They are typically created to carry out repetitive, pre-defined tasks more efficiently than humans.[2] They can be used for ecommerce, customer service, and content distribution; one common type, the chatbot, simulates conversation, while other types can schedule social media or other posts or create polls. Platforms such as Facebook Messenger,[3] Twitter,[4] and WhatsApp[5] offer bot integration. Botnets are connected computers performing monotonous tasks to keep websites going.[6] They are also becoming companions for people: In April 2020, half a million people downloaded an app called Replika that allows the user to converse with a human-like robot over text. While that app is not entirely convincing, some experts believe a completely convincing chatbot will exist in five to 10 years.[7]

Bot technology is also used for illegal purposes for example, sending spam and phishing emails containing malware, engaging in internet fraud, and trafficking in illegal goods and services. Illegal botnets gain control of computers through hacking or malicious coding and their owners can then use these computers to carry out DDoS attacks, email spam to many more millions of Internet users, generate fake Internet traffic, and extort ransom from users.[8]

To keep pace with China's ambitious artificial intelligence development, on February 11, 2019,[9] President Trump signed an executive order announcing the American Artificial Intelligence Initiative.[10] This strategy, according to the White House, is a concerted effort to promote and protect national AI technology and innovation, that "implements a whole-of-government strategy in collaboration and engagement with the private sector, academia, the public, and like-minded international partners." The move followed calls from AI experts[11] across industry, academia, and government to prioritize development of this area, including a May 2018 memo from then-defense secretary James Mattis asking the president to create a national strategy for AI. At the same time, however, there has so far been little research into how terrorist groups are already utilizing some of the basic forms of AI available to them, such as bots.

A History Of Terrorist Bots On Twitter

Every day, bots are being used by jihadis, especially on Telegram, for a wide variety of purposes. Highlighting these uses just recently was the pro-Al-Qaeda Jaysh Al-Malahim Al-Electroni Telegram channel that announced, on July 20, 2020, that it was recruiting supporters with expertise in programming, "media raids," film montage, hacking, translation, and graphic design. Those interested, it added, should make contact using its bots.[12] The same day, the pro-ISIS Basa'ir Da'wah Foundation, on Telegram, urged supporters, especially designers, poets, and religious students, to join the foundation's team by contacting its bot on the platform.[13]

Jaysh Al-Malahim recruitment notice; Basa'ir Da'wah Foundation recruitment notice

Also, on July 23, the pro-Al-Qaeda Jaysh Al-Malahim Al-Electroni announced that it was seeking a commentator with excellent Arabic for its videos and asked candidates to apply to its Telegram bot.[14]

The recruitment notice referring candidates to Jaysh Al-Malahim Al-Electroni's Telegram bot

A pro-ISIS Telegram bot warned, on August 3, that intelligence and "Rafidites" Shi'ites had infiltrated pro-ISIS groups on Telegram and were creating fake accounts under the names of genuine ISIS supporters. It named three specific Telegram accounts claiming to be pro-ISIS that it said were actually run by Shi'ites.[15]

Underlining how bots are energizing jihadis' daily social media efforts, on August 5, Jaysh Al-Malahem Al-Electroni released a poster titled "We Remain in the Media Battle, Victorious." It depicts an armed fighter with the logos of Telegram, Instagram, Facebook, Pinterest, LinkedIn, YouTube, and Twitter.[16]

As early as 2015, when it was estimated that bots made up over half of all Internet traffic, ISIS was already known to have created thousands of Twitter bots to disseminate violent content, raise funds, and recruit supporters, as well as jamming activist communication on the platform, silencing their opponents on Twitter.[17] The bots latched onto trending hashtags to send out a stream of pro-ISIS messages a tactic adopted by ISIS as early as 2014[18] with the aim of inserting ISIS into ongoing conversations on different topics. Following the November 2015 Paris ISIS attacks, the international hacktivist group Anonymous launched a campaign against ISIS bots across the Internet under the hashtag #opISIS, shutting down over 25,000 of them within a month.[19]

After ISIS leader Abu Bakr Al-Baghdadi was killed by U.S. forces in late October 2019, Mustafa Ayad, a terrorism researcher at the London-based Institute for Strategic Dialogue, noticed on Twitter that many ISIS tweets were being posted faster than humanly possible. Accounts posting them that were suspended quickly returned with slight changes in usernames to avoid detection, while other accounts posting the content appeared to have been hacked. Twitter said that between January and July 2019 it had suspended more than 115,000 accounts for terrorism-related violations.[20] Telegram CEO Pavel Durov has stated that he takes steps to remove jihadi accounts and content on the platform, and has on occasion taken limited action to do so, but the accounts generally return.

A May 20 virtual forum held by the House Homeland Security Committee tackled the question of whether the coronavirus pandemic is fueling extremism on social media. Session co-host Rep. Max Rose, chairman of the Intelligence and Counterterrorism Subcommittee, said: "Terrorists' use of the Internet has been magnified by this public health crisis, with social media and gaming platforms increasingly being used for recruitment and propaganda here and around the world particularly as people spend more and more time online at home."[21] Bots are one technology that makes spreading that misinformation and messaging easier for extremist groups.

The MEMRI JTTM Team: For Over Two Years, Monitoring Bots Spreading ISIS Content On Telegram

As part of the work of the Cyber Jihad Lab team, which studies terrorists' use of technology, and of the MEMRI Jihad and Terrorism Threat Monitor (JTTM) team, over the past two years both teams have documented and identified the accounts in this report on the encrypted messaging app Telegram that are using bots. In October 2019, Telegram's @ISISWatch channel claimed to have blocked 7,431 terrorist bots and channels, many of which were used to launch campaigns for fundraising using cryptocurrency.[22] @ISISWatch was created the day after MEMRI exposed Telegram as ISIS's and jihadis' "app of choice" in a report published December 23, 2016 a report that made the front page of The Washington Post.[23] At that time, ISISWatch stated that Telegram "actively bans ISIS content on Telegram," that it was shutting down "an average of 70 ISIS channels" each day, and that between September and December 2016 it had shut down nearly 8,000 "ISIS bots and channels."[24] Nevertheless, Telegram remains a haven for jihadi communications, outreach, recruiting, and other activity even though the ISISWatch channel continues to report daily on terrorist bot and channels it claims to have removed.

Creating Bots On Telegram

Telegram allows users to create bots for sending, responding to, and otherwise managing messages, news, and notifications. They can also be used to manage digital assets such as cryptocurrencies.[25] Telegram's @BotFather tool walks users through the process quickly and easily, and provides support for questions connected to the process.[26]

To create a bot, the user first searches for @BotFather on Telegram, and then clicks on it to begin the process:

The user is then asked to create a name and username for the new bot. Once this is done, Telegram generates a unique link to the bot where the user can add a description, about section, and profile picture, and directs the user to a list of commands that it can be programmed to carry out.

To view a video of the creation of a Telegram bot, click here or below:

JIHADI USE OF BOTS ON THE ENCRYPTED MESSAGING PLATFORM TELEGRAM

Telegram's popularity among jihadis over the past five years has been well documented; for example, since 2015,[27] the Islamic State (ISIS) has used it in an official capacity, to disseminate calls for violence and share detailed instructions on how to carry out terrorist attacks, and to coordinate attacks an early example being the 2015 Paris attacks.[28]

ISIS, Al-Qaeda, and other jihadi organizations as well as their supporters are using bots on Telegram to disseminate their messaging in a variety of languages. They can be created in a chat or channel to allow them to connect with users. The bots can handle messages, with group members conversing with the bot as with a human. The MEMRI JTTM has been monitoring jihadi bots on Telegram since 2015.[29]

The examples below show how jihadi organizations ISIS, Al-Qaeda, Hay'at Tahrir Al-Sham (HTS), the Somali Al-Qaeda affiliate Al-Shabab Al-Mujahideen, the Gaza-based Jaysh Al-Ummah, and Kashmiri jihadi groups and their supporters, and other jihadis, are using bots on Telegram for a wide range of purposes.

While one major use is for mass dissemination of official notifications, publications, and video productions, these groups also use bots designed to allow users to access archives of jihadi content produced by groups and media organizations. The archives were found to include content from Turkestan Islamic Party (TIP), Voice of Islam, Al-Qaeda in the Arabian Peninsula's (AQAP) Al-Malahem Foundation, Libyan Al-Rayah Foundation, Al-Shabab's Al-Kata'ib Foundation, Al-Qaeda In The Islamic Maghreb's (AQIM) Al-Andalus Foundation, Al-Qaeda media group Global Islamic Media Front (GIMF), Group for the Support of Islam and Muslims (GSIM) Al-Zalaqah Foundation, and Jabhat Al-Nusra's (JN) Al-Manarah Al-Bayda' Foundation.

Also found in the archives was content from jihadi factions in Syria, Iraq, Chechnya, Bosnia, Egypt, Tunisia, and Libya, and from jihadi leaders past and present, including Osama bin Laden, Al-Qaeda leader Ayman Al-Zawahiri, HTS leader Abu Muhammad Al-Joulani, and Syria-based cleric Abdullah Al-Muhaysini.

Bots used by jihadis also allow users to request information and publications and register for courses, for example for physical fitness and bombmaking; solicit documents for later publication; submit and answer questions about migrating to Syria or Iraq, about technology, and about other subjects; widely share links to new Telegram channels following shutdowns; share tutorials on cyber security; use and hack accounts on social media platforms; recruit volunteer translators, video editors, and others; request donations for poor families, including families of slain jihadis; announce new accounts in multiple languages; promote causes such as supporting or freeing women from Al-Hol camp in Syria; and even convey holiday wishes.

This report documents the past two years of the JTTM's monitoring of jihadi use of bots for recruiting, fundraising, plan hacking and terror attacks, and more. It includes their use by major terrorist groups ISIS, Al-Qaeda, and others and by the most influential hacking groups and cyber activists. This use of bots a sophisticated tool made readily available to the public of social media users is a sign of what is to come: Jihadi groups will be using them much more in the future, and the West needs to be prepared to stop this before it happens.

ISLAMIC STATE (ISIS)

Planning Attacks, Sharing Information On Training, Bombmaking, And Weapons, Disseminating News, And Recruiting

The pro-ISIS Nasr News launched a new Telegram bot distributing official ISIS news in the Indonesian language: @NN20id_bot.[30]

On March 18, 2020, pro-ISIS Al-Tamkin Box launched a new Telegram bot, @Nooooooooods_bot, which distributes official ISIS news reports, official and unofficial videos, the Al-Naba' weekly, and articles by Al-Tamkin.[31]

JTTM subscribers can click here to view the full report

*Steven Stalinsky is Executive Director of MEMRI; R. Sosnow is Head Editor at MEMRI.

[1] Voxprogroup.com/iot-and-ai/ai-machine-learning-and-bots-whats-it-all-about, May 2017.

[2] Cdn2.hubspot.net/hubfs/53/assets/hubspot.com/research/reports/What_is_a_bot_HubSpot_Research.pdf?t=1492209311951, accessed July 30, 2019.

[3] Blog.hootsuite.com/facebook-messenger-bots-guide, May 9, 2019.

[4] Chatbotslife.com/how-to-make-a-twitter-bot-841b20655328, January 9, 2018.

[5] chatbotsmagazine.com/a-step-by-step-guide-to-creating-whatsapp-chatbot-for-business-275dc3924b17, May 14, 2019.

[6] Us.norton.com/internetsecurity-malware-what-is-a-botnet.html.

[7] Nytimes.com/2020/06/16/technology/chatbots-quarantine-coronavirus.html, July 16, 2020.

[8] Us.norton.com/internetsecurity-malware-what-is-a-botnet.html.

[9] Nbcnews.com/tech/tech-news/trump-s-artificial-intelligence-order-lacks-funding-not-target-china-n970406, February 11, 2019.

[10] Whitehouse.gov/ai/executive-order-ai/.

[11] Nytimes.com/2018/08/26/technology/pentagon-artificial-intelligence.html, August 26, 2018.

[13] Telegram/ Ghiras11bot, July 20, 2020.

[14] Talk.gnews.bz/channel/news-akhbar?msg=2yweGevZj58h2gpci, July 23, 2020.

[15] Telegram/ UI_BXH_X_BOT, August 3, 2020

[16] Telegram/ Al_MalahemCyberArmybot, August 5, 2020.

[17] Imperva.com/blog/bot-traffic-report-2014/, December 18, 2014.

[19] Businessinsider.com/anonymous-battles-isis-political-bots-2015-12, December 14, 2015.

[20] Npr.org/2019/11/01/775509366/twitter-struggling-to-shut-down-bot-and-impersonation-accounts-created-by-isis, November 1, 2019.

[21] Homelandprepnews.com/stories/49829-social-media-companies-must-use-ai-to-thwart-extremist-content-experts-tell-congressmen, May 27, 2020.

[22] Decrypt.co/11229/us-and-australian-officials-concerned-over-terrorist-cryptocurrency-use,November 7, 2019.

[25] Core.telegram.org/bots, accessed July 30, 2019; Coinrivet.com/what-is-a-cryptocurrency-telegram-bot, June 20, 2019.

[26] Core.telegram.org/bots/api, accessed July 30, 2019.

[28] See MEMRI report Germany-Based Encrypted Messaging App Telegram Emerges As Jihadis' Preferred Communications Platform Part V Of MEMRI Series: Encryption Technology Embraced By ISIS, Al-Qaeda, Other Jihadis September 2015-September 2016, December 23, 2016; MEMRI Daily Brief No. 192, Fears About New Facebook Cryptocurrency Are Overblown While Main Threat Of Criminal Activity On Telegram App Is Being Criminally Ignored, July 16, 2019; MEMRI Daily Brief No. 161, As Momentum Builds To Solve Problem Of Encrypted Terrorist Communications, A Possible Third Way Emerges, May 24, 2019; MEMRI Daily Brief No. 174, The Cryptocurrency-Terrorism Connection Is Too Big To Ignore, January 3, 2019; MEMRI Inquiry and Analysis No. 1387, The Imminent Release Of Telegram's Cryptocurrency, ISIS's Encryption App Of Choice An International Security Catastrophe In The Making, March 30, 2018; Congressional letter to Telegram CEO Durov, Memri.org/pdf/20181025_Telegram_sherman-Poe.pdf.

[29] Rsis.edu.sg/rsis-publication/cens/co15256-telegram-and-is-a-potential-security-threat/#.XUCPdOhKiUk, November 25, 2015.

[31] Telegram/ Ma Lakum Kayfa Tahkumun, March 18, 2020.

Follow this link:
Jihadi Use Of Bots On The Encrypted Messaging Platform Telegram - Middle East Media Research Institute

Read More..

Physicists watch quantum particles tunnel through solid barriers. Here’s what they found. – Live Science

The quantum world is a pretty wild one, where the seemingly impossible happens all the time: Teensy objects separated by miles are tied to one another, and particles can even be in two places at once. But one of the most perplexing quantum superpowers is the movement of particles through seemingly impenetrable barriers.

Now, a team of physicists has devised a simple way to measure the duration of this bizarre phenomenon, called quantum tunneling. And they figured out how long the tunneling takes from start to finish from the moment a particle enters the barrier, tunnels through and comes out the other side, they reported online July 22 in the journal Nature.

Quantum tunneling is a phenomenon where an atom or a subatomic particle can appear on the opposite side of a barrier that should be impossible for the particle to penetrate. It's as if you were walking and encountered a 10-foot-tall (3 meters) wall extending as far as the eye can see. Without a ladder or Spider-man climbing skills, the wall would make it impossible for you to continue.

Related: The 18 biggest unsolved mysteries in physics

However, in the quantum world, it is rare, but possible, for an atom or electron to simply "appear" on the other side, as if a tunnel had been dug through the wall. "Quantum tunneling is one of the most puzzling of quantum phenomena," said study co-author Aephraim Steinberg, co-director of the Quantum Information Science Program at Canadian Institute for Advanced Research. "And it is fantastic that we're now able to actually study it in this way."

Quantum tunneling is not new to physicists. It forms the basis of many modern technologies such as electronic chips, called tunnel diodes, which allow for the movement of electricity through a circuit in one direction but not the other. Scanning tunneling microscopes (STM) also use tunneling to literally show individual atoms on the surface of a solid. Shortly after the first STM was invented, researchers at IBM reported using the device to spell out the letters IBM using 35 xenon atoms on a nickel substrate.

While the laws of quantum mechanics allow for quantum tunneling, researchers still don't know exactly what happens while a subatomic particle is undergoing the tunneling process. Indeed, some researchers thought that the particle appears instantaneously on the other side of the barrier as if it instantaneously teleported there, Sci-News.com reported.

Researchers had previously tried to measure the amount of time it takes for tunneling to occur, with varying results. One of the difficulties in earlier versions of this type of experiment is identifying the moment tunneling starts and stops. To simplify the methodology, the researchers used magnets to create a new kind of "clock" that would tick only while the particle was tunneling.

Subatomic particles all have magnetic properties and when magnets are in an external magnetic field, they rotate like a spinning top. The amount of rotation (also called precession) depends on how long the particle is bathed in that magnetic field. Knowing that, the Toronto group used a magnetic field to form their barrier. When particles are inside the barrier, they precess. Outside it, they don't. So measuring how long the particles precess told the researchers how long those atoms took to tunnel through the barrier.

Related: 18 times quantum particles blew our minds

"The experiment is a breathtaking technical achievement," said Drew Alton, physics professor at Augustana University, in South Dakota.

The researchers prepared approximately 8,000 rubidium atoms, cooled them to a billionth of a degree above absolute zero. The atoms needed to be this temperature, otherwise they would have moved around randomly at high speeds, rather than staying in a small clump. The scientists used a laser to create the magnetic barrier; they focused the laser so that the barrier was 1.3 micrometers (microns) thick, or the thickness of about 2,500 rubidium atoms. (So if you were a foot thick, front to back, this barrier would be the equivalent of about half a mile thick.) Using another laser, the scientists nudged the rubidium atoms toward the barrier, moving them about 0.15 inches per second (4 millimeters/s).

As expected, most of the rubidium atoms bounced off the barrier. However, due to quantum tunneling, about 3% of the atoms penetrated the barrier and appeared on the other side. Based on the precession of those atoms, it took them about 0.6 milliseconds to traverse the barrier.

Chad Orzel, an associate professor of physics at Union College in New York, who was not part of the study, applauded the experiment, "Their experiment is ingeniously constructed to make it difficult to interpret as anything other than what they say," said Orzel, author of "How to Teach Quantum Mechanics to Your Dog" (Scribner, 2010) It "is one of the best examples you'll see of a thought experiment made real," he added.

Experiments exploring quantum tunneling are difficult and further research is needed to understand the implications of this study. The Toronto group is already considering improvements to their apparatus to not only determine the duration of the tunneling process, but to also see if they can learn anything about velocity of the atoms at different points inside the barrier. "We're working on a new measurement where we make the barrier thicker and then determine the amount of precession at different depths," Steinberg said. "It will be very interesting to see if the atoms' speed is constant or not."

In many interpretations of quantum mechanics, it is impossible even in principle to determine a subatomic particle's trajectory. Such a measurement could lead to insights into the confusing world of quantum theory. The quantum world is very different from the world we're familiar with. Experiments like these will help make it a little less mysterious.

Originally published on Live Science.

See the rest here:

Physicists watch quantum particles tunnel through solid barriers. Here's what they found. - Live Science

Read More..

The Force of Nothingness Has Been Used to Manipulate Objects – ScienceAlert

Scientists can use some pretty wild forces to manipulate materials. There's acoustic tweezers, which use the force ofacoustic radiationto control tiny objects. Optical tweezers made of lasers exploit the force of light. Not content with that, now physicists have made a device to manipulate materials using the force of nothingness.

OK, that may be a bit simplistic. When we say nothingness, we're really referring to the attractive force that arises between two surfaces in a vacuum, known as the Casimir force. The new research has provided not just a way to use it for no-contact object manipulation, but also to measure it.

The implications span multiple fields, from chemistry and gravitational wave astronomy all the way down to something as fundamental and ubiquitous as metrology - the science of measurement.

"If you can measure and manipulate the Casimir force on objects, then we gain the ability to improve force sensitivity and reduce mechanical losses, with the potential to strongly impact science and technology," explained physicist Michael Tobar of the University of Western Australia.

The Casimir force was first predicted in 1948 by Dutch theoretical physicist Hendrik Casimir, and finally demonstrated within his predicted values in 1997.

But, since then, it has been generating a lot more interest, not just for its own sake, but for how it might be used in other areas of research.

What Casimir predicted was that an attractive force would exist between two conducting plates in a vacuum, due to contrasts in quantum fluctuations in the electromagnetic field.

"To understand this, we need to delve into the weirdness of quantum physics. In reality a perfect vacuum does not exist - even in empty space at zero temperature, virtual particles, like photons, flicker in and out of existence," Tobar said.

"These fluctuations interact with objects placed in vacuum and are actually enhanced in magnitude as temperature is increased, causing a measurable force from 'nothing' - otherwise known as the Casimir force."

The team's experiment took place in room temperature settings.They made use of a tiny metallic enclosure designed to confine certain kinds of electromagnetic radiation, referred to as a microwave re-entrant cavity.

Separated from this cavity by a gap of about one micrometre was a metal-plated silicon nitride membrane acting as a Casimir spring.

By applying an electrostatic force, the team was able to control the re-entrant gap with exquisite precision.

This, in turn, allowed them to manipulate the membrane with the Casimir force that arose when the gap was sufficiently small.

"Because of the Casimir force between the objects, the metallic membrane, which flexed back and forth, had its spring-like oscillations significantly modified and was used to manipulate the properties of the membrane and re-entrant cavity system in a unique way," Tobar said.

"This allowed orders of magnitudes of improvement in force sensitivity and the ability to control the mechanical state of the membrane."

But controlling the gap also allowed the researchers to measure the force. As the gap opened, the Casimir force grew weaker, until it was at a point where it was no longer acting on the membrane. By studying the changes to the membrane, the team could generate high precision measurements.

It's a novel way of measuring nothing, though other methods have used tiny rapidly moving materials to also get a grip on the force exerted by variations in otherwise vacant quantum fields.

Other studies have also put the force to use in less precise ways, helping tiny silicon devices keep their distance, for example.

"The technique presented here has high potential to create additional schemes and devices by manipulating the thermal Casimir force," the researchers wrote in their paper.

"For example, 'in situ' agile programmable devices, engineered to manipulate mode structures and improve resonator losses as needed at room temperature, could be constructed, including the development and manipulation of topological mechanical oscillators."

Doesn't that sound fun?

The research has been published in Nature Physics.

Link:

The Force of Nothingness Has Been Used to Manipulate Objects - ScienceAlert

Read More..

Taking a risk on theoretical physics | symmetry magazine – Symmetry magazine

If Juan Maldacena were not a physicist, he thinks he would have been an engineer like his father. As a boy growing up in Buenos Aires, he liked to spend time with him tinkering with the washing machine or the car or other household items, learning how they exploited the laws of physics, as he sees it today.

Now a theoretical physicist at the Institute for Advanced Study in Princeton, New Jersey, Maldacena is world-famous in part for writing what is still one of the most influential articles in string theory.

Although the abstract realms of theoretical physics may seem like a far cry from the literal nuts and bolts of heavy appliances, I think its not too different, he says. Building a theory that works is like building a washing machine that works.

String theory just has a lower risk of electrocution or a flooded basement.

When Maldacena began his post-secondary education at the University of Buenos Aires, it seemed natural to enter as a physics major. I really loved learning about how the laws of physics explained various aspects of the real world, he says.

After two years, he transferred to the Instituto Balseiro in the far western Argentinian city of Bariloche, a research-oriented institution that accepts students after their first two years at other institutions. It is small and grants degrees in only a few disciplines, all related to physics and engineering.

Maldacena graduated with the equivalent of a US masters degree in 1991. He debated what his next move should be: physics graduate school or leaving the academic world to work as an engineer. He was a strong student and loved the discipline but worried that he might not have what it takes to make it as a physics researcher.

I really enjoyed taking the classes, but I didnt know what research was like. It was still a big mystery to me, he says. In the end, I decided to take my chances.

He was accepted to Princeton University, where he started a PhD that fall. Maldacena thrived at Princeton, where he says he enjoyed taking classes with some of the best particle physicists in his field. It was wonderful to see all these people whose papers I had been reading.

His doctoral thesis probed the behavior of black holes in string theory, a framework that unites quantum mechanics and Einsteins theory of relativity by describing fundamental particles as one-dimensional strings.

String theory is a theory of quantum gravity, so Maldacena was extrapolating from the quantum scale to the very, very large. It was considered to be a big success for string theorythe fact that you could describe black holes, which are a big deviation from flat space. It was a consistency check for this theory, he says.

Prominent string theorist Nathan Seiberg was on sabbatical from Rutgers University at the IAS when he met Maldacena, who was then a graduate student at Princeton. They were later colleagues at Rutgers, and they are now colleagues again at the IAS.

Seiberg says he was enormously impressed with Maldacena when they first met. It was quite clear from day one that he was someone specialvery, very specialand he would rise to the top.

Maldacena is best known for his description of the anti-de Sitter/conformal field theory correspondence. The crux of the AdS/CFT correspondence is that a theory of gravity in one universe is the same as the quantum field theory on the boundary of that universe.

Maldacenas first paper describing the idea, published in 1997, has become one of the most-cited articles in string theory, and high-energy physics more broadly. These are results that will stay fundamental in physics for centuries, Seiberg says.

The correspondence has had interesting applications to several fields, including nuclear physics, condensed matter physics, cosmology and mathematics.

Maldacena graduated from Princeton in 1996, so his AdS/CFT breakthrough came very early in his career, when few academics would risk taking a big swing like that. Hes not afraid. Hes very bold, Seiberg says. He likes to attack the most difficult questions that most people would stay away from. He just goes full steam ahead.

The risk paid off. Maldacena was hired as an associate professor at Harvard University directly from the first year of his postdoc at Rutgers and was offered a full professorship two years later. Shortly after that, he was offered a permanent position at the IAS and moved back to New Jersey.

Maldacenas clarity stands out to Seiberg. In research, one is often in this fog of confusion. And he has this clear mind, seeing through the fog and knowing where to go, Seiberg says.

Seiberg says they have worked together a few timesand the joy of the collaboration was enormousbut Maldacena has also had an influence on him far beyond their formal co-authorship. There were many times, both when I made official presentations and in informal conversations, that he would ask a question that completely changed the direction of my own research, Seiberg says.

When he isnt doing physics, Maldacena enjoys hiking with his wife and three children. He sees his work and recreation as two sides of the same coin. When you think about physics problems, you are thinking about very specific aspects of nature, Maldacena says. When you go hiking, you appreciate other aspects of nature.

In addition to his own research, Maldacena has advised several PhD students and postdocs. He has a very good sense for identifying talent, Seiberg says. His track record is amazing.

Maldacena remembers when he wasnt sure whether he should try going into a research career in physics and hopes that other students in his position will not let that fear keep them from trying it. Maybe they will find that they are better than they expected, he says. Or maybe they will love it more than they expected.

See the original post:

Taking a risk on theoretical physics | symmetry magazine - Symmetry magazine

Read More..