The Attributer’s Blog – Governed

In the previous blog article (Conflicted, April 2019) The Attributer examined the potential conflict between the decisions made by autonomous systems and those made by their human operators. The case study was the alleged failure of the MCAS[1] system on the Boeing 737 Max aircraft and the part it may have played in two recent crashes of this aircraft. The […]

The Attributer’s Blog – Non-Conflicted

Within the last 24 hours (as The Attributer writes this) the CEO of Boeing, Dennis Muilenburg, has publicly acknowledged that bad data feeding into an automated flight system on the company’s popular 737 Max jets played a role in two recent crashes [1]. “With the release of the preliminary report of the Ethiopian Airlines flight 302 accident investigation it’s apparent […]

The Attributer’s Blog – Zero Trusted

It’s the beginning of 2019 and the new buzz-ware from the security solution vendor community is ‘zero trust’. What do we think that means? It must be important because they’re all rushing to tell us how their products and services support this new initiative in security architecture. It’s being presented as the new holy grail, something never before imagined, that […]

The Attributer’s Blog – Autonomous

Gartner tells us in its Top 10 Strategic Technology Trends for 2019(1) that autonomous things are number one in the list. Autonomous things use artificial intelligence (AI) to perform tasks traditionally done by humans. We are talking robotics on a new level of sophistication and with greater levels of autonomy than seen in previous generations of robot technology. The types […]

The Attributer’s Blog – Provenance Assured

“Trust but verify” – Russian proverb. Earlier this year The Attributer published an article entitled ‘Fake Protected’. This new article revisits the same topic but from a different perspective. We are living in a time of increasing outbreaks of ‘fake news’ in particular, and ‘fake information’ in general. How do we establish the provenance of data and the information that […]

The Attributer’s Blog – Quantum Ready

Quantum Cryptography Revolution Are you ready for the quantum revolution in secure communications? OK, so you’re not ready. Don’t panic, it’s still a long time coming. However, it is useful to be cognizant with the latest cryptographic developments and to get a glimpse of what is coming over the horizon. These developments will change the way we do things in […]

The Attributer’s Blog – Threat Modelled

The Attributer has become aware that threat modelling is enjoying some popularity at the moment. However, most of what is written and said about it makes little sense. It’s not the role of this column to ‘name and shame’, but if you doubt what is said here, just type the words ‘threat modelling’ into your favourite search engine and read […]

The Attributer’s Blog – Fake Protected

Selling fake goods is nothing new. It dates back to the beginning of commerce.  Making fraudulent claims about patent medicines was very common in the 18th and 19th centuries. In the 20th and 21st centuries regulations and laws started to limit the possibilities. The emergence of a consumer society during the late 20th century led to a vigorous trade in […]