Archive for March, 2022

Education can help us stay ahead of the disinformation wars – University World News

GLOBAL

I dont think it says a whole lot because fake news is fake by definition. More important is that it is disinformation disinformation disguised as news and-or information. The techniques have not fundamentally altered since the days of the KGB.

But what is different, he says, is the complexity that digital communications allow and the fact that the internet reaches way more people than just handing out fliers.

The Belgium-based Atlantic Councils Digital Forensic Research Lab (DFRL), of which Andriukaitis is associate director, is one of several institutes devoted to exposing and debunking disinformation on the internet, and understanding the intended goals of both state and non-state actors.

Two others are the new Information Integrity Lab (IIL) housed in the Professional Development Institute at the University of Ottawa (UO) in Canada and the Network Contagion Research Institute (NCRI) at Rutgers University in New Jersey, United States, which has been training 100 students each year for the past three years.

The 18 February media release announcing the IIL, Canadas first cross-disciplinary lab designed to research and expose fake news could not have been timelier. Six days later, after a massive disinformation campaign that including trumped up claims that Ukraine was mistreating ethnic Russians in the breakaway provinces of Donetsk and the Donbas (led by pro-Russian politicians), Russian President Vladimir Putins army invaded Ukraine.

According to UO President Jacques Frmont: Knowledge, facts and truth are being challenged, and challenged very aggressively. Disinformation and fake news are being used not only by individuals and organisations, but also by state actors to destabilise entire societies, to severely erode public confidence in private and public sector organisations and to attack our core beliefs in freedom, equality, the rule of law and human rights.

Frmont links the battle against fake news to the core mandate of higher education institutions: research, critical thinking and the advancement and circulation of knowledge and facts, as does Rutgers Psychology Professor Joel Finkelstein, who is chief science officer and cofounder of NCRI.

Russias three-part campaign

The disinformation campaign Russia unleashed prior to attacking Ukraine (and the one being waged today) consists of three parts.

In addition to claims about Ukraines actions in Donetsk and the Donbas, the first part of the disinformation campaign repeats Putins irredentist assertion that Ukraine does not have the right to exist as a separate country, made most famously in an essay he published last summer.

A number of websites and internet influencers parrot what Andriukaitis calls Putins mismanagement of historical facts: that Ukraine was created by Vladimir I Lenin, the founder of the Soviet Union (Ukraine was one of the constituent ethnic republics of the USSR); that half of Ukraines territory was given to it by the Russians and that the Ukrainians and Russians are one people and members of the same Russian Orthodox Church, despite the Ukrainian Orthodox Church having achieved autocephaly (independence) in October of 2018.

According to Andriukaitis, not every website or post needs to repeat all of Putins overarching narrative to help support it. Botnets produce tweets that may repeat only one part of Putins fabricated story, for example, the claim about the Russians and Ukrainians belonging to one true church.

By the reverse of the process of elimination, these tweets contribute to the political imaginary desired by Putin. As defined by sociologist Craig Browne of the University of Sydney, Australia, and Paula Diehl, chair of political theory and the history of ideas at Christian-Albrecht University of Kiel in Germany, the political imaginary is the collective structure that organises the imagination and symbolism of an individuals political thought; in this case the idea that the Ukrainian Orthodox Church is at best a theological error.

Its often hard to connect the dots, Andriukaitis told University World News. And its hard to know whether the actors are connected to Russia or working with it. They might be, you know, just useful idiots in the West. But if you take a step back, you see the whole thing, you can see recurring messages supported by various stories and posts.

The second part of the disinformation campaign denied that Russia was planning an invasion, despite the documented build-up of its forces around Ukraine. Andriukaitis likens this claim to those on pro-Russian websites charging the West with having started the war in Syria that began a decade ago.

One of my favourite quotes was that Russia has never started a war, which is hilarious, says Andriukaitis, who has taught personal digital security and introduction to advanced digital forensics at the College of Europe, Natolin in Warsaw, Poland.

Russia invaded Georgia in 2008 to support the pro-Russian insurgents in the breakaway provinces of South Ossetia and Abkhazia; in 2014 Russia invaded and then annexed Crimea; and on 17 September 1939, as part of the secret protocols of the Nazi-Soviet Pact, Russia invaded Poland.

At first glance, the third part of the disinformation campaign appears to undercut the second because it identifies a casus belli. Among the items that made up this fake news is Putins claim that the Russians had to liberate Ukraine from the drug-addled Nazi gangsters who had taken control of the country.

These assertions were so outrageous that fact checkers easily debunked them, says Andriukaitis, the Nazi charge being ludicrous since Volodymyr Zelenskyy, Ukraines president, is Jewish and lost family members in the Holocaust, and far-right parties poll in the low single digits.

Since Russia invaded Ukraine, the disinformation campaign has continued. On 5 March, for example, the day I started writing this article, CNN debunked a series of (fake) postings that purported to come from the network, one of which reported that an American had been killed in Ukraine a claim repeated a few hours later on the floor of the United Nations Security Council by the Russian ambassador to the United Nations.

Tracking code words

Code words or expressions like Hail Honkler, the visual of which is a clownish figure, is important for creating group cohesion among people who dont really operate in the real world and spend hours and hours online looking for increasingly sensational and dark material, says Finkelstein.

The seemingly edgy humour and ambiguity in Hail Honkler is intentional. Hail Honkler seems like a joke, unless you are in the know, and know that it is a way to get around restrictions on Heil Hitler on platforms such as YouTube and Reddit.

For NCRIs researchers, however, these code words and visual memes are traces that they feed into programs like Pushshift, a large-scale social media ingestion engine thats leveraged by more than 307 universities across the world.

We use data-driven machine learning analyses that take their findings and are able to sort of understand how the depth and breadth and extent of networks that we are seeing are connected, says Finkelstein. Both Finkelstein and Serge Blais, executive director of UOs Professional Development Institute, liken the tracking of code words to the way weather satellites look for weather patterns.

In its Insights Report of 1 March 2022, for example, the NCRI shows that between 1 and 23 February, the topic network, formed by over 29,000 tweets, denouncing the New World Order, and linking COVID-19 vaccines, the Great Reset (conspiracy) and the Trucker convoy, as well cryptically antisemitic framings such as [George] Soros and Globalist. (A topic network is a cloud of words connected to each other by contextual similarity and can be imagined as the idea-mapping that university and college teachers use to teach brain storming.)

This topic network, shaped vaguely like a hot air balloon, all but vanished on 24 February, the day the Russians invaded Ukraine. It was replaced by one in which Ukraine and Putin were the largest central nodes, the point at which the lines indicating relationships came together.

Popular right-wing Instagram accounts like dc_draino, the_typical_liberal and dreamrare have insinuated that Ukrainian President Zelenskyy is a crisis actor [who is] part of a deep state plot to bring about the new world order, the NCRI reported.

These linkages allow analysts like Alex Goldenberg, senior intelligence analyst at the NCRI, to understand the dynamics of these groups and what fuels their growth.

It is not possible to know precisely which of the right-wing influencers Russia supports or even, Blais told me, whether they are human as opposed to the digital expression of an artificial intelligence (AI) algorithm.

Nor is it known which left-wing digital actors Russia supports, but, says the NCRI, groups that use communist emoji symbols (such as the hammer and sickle, the symbol of Communist Russia) express support for communist regimes. Bot accounts disseminated the hashtag #abolishNATO, created by @mountainchen24, which NCRI calls a communist influencer.

What is known is that the Russians are paying or supporting both the radical right and the radical left, says Andriukaitis. Further, he told me that he does not think its a coincidence that those highly pro-Kremlin, highly anti-EU and anti-NATO groups were among the most aggressive antivaxxers. I think it is part of a longer game to sow discord.

Professor Christian Luprecht, who teaches political science at Queens University and at the Royal Military College of Canada (both in Kingston, Ontario), and who has criticised the laxness of Canadas laws about foreign actors financial influence in the countrys politics, makes a similar point with reference to Project Lakhta, the Russian name for its meddling in the 2016 US presidential election, that saw Donald Trump lose the popular vote but win the Electoral College and, thus, the presidency.

The Russians may not have cared who became the president of the United States. What theyre interested in doing is throwing into question whomever is the president of the United States. For them, success is polarising American society. Its undermining the institutions or showing that they are paralysed that is the aim.

For his part, Andriukaitis thinks that the Russians wanted Project Lakhta to swing the election in Trumps favour, but not just to sow discord (as was clear from candidate Trumps statements). Rather, Putin had another goal, which Andriukaitis stated in chilling words: To show that Russia is almighty and all powerful and that Putin decides who will be president of the United States.

Case studies

One of the 50 case studies that NCRI uses to train the next generation of analysts is about the far-right Boogaloo boys in the United States and how the institutes analysis allowed police to thwart a possible blood bath in Richmond, Virginia on 20 January 2020.

A few weeks earlier, NCRIs analysts monitoring Twitter spotted a new set of memes and photos posted by the Boogaloo boys, who had not previously been on NCRIs radar.

Photos showed young men, their faces hidden by balaclavas, wearing body armour and carrying semi-automatic weapons. Some of the men wore patches with skulls on them, an in-group reference to the Atomwaffen Division (AWD).

Founded in the United States in 2013, the Nuclear War Division has recruited members from retired and serving US armed service personnel and has tried to recruit at Boston University, the University of Chicago, the University of Central Florida and Old Dominion University in Virginia. Among the AWDs goals are instigating a race war and violently overthrowing the government of the United States.

The Boogaloo boys also wore shoulder patches featuring Pepe the Frog. Developed as a comic figure by Matt Furie in 2005, Pepe the Frog was soon appropriated by right-wing groups and popularised on 4chan, an unedited discussion board, which has posts of Pepe the Frog wearing night vision goggles and holding an automatic weapon.

Using Pushshift and other software, NCRIs analysts tracked how the Boogaloo boys postings had become increasingly apocalyptic and violent. NCRIs software also identified Facebook groups that post links to sites showing how to use 3D printers to make firearms and high-capacity magazines.

We were able to combine our social media investigation engine, social media analytics, with open-source software to assess that the Boogaloo boys wasnt just a meme; it was an actual group that represented a kinetic [real world] threat, says Goldenberg of the NCRI.

NCRI gave this information to a number of police forces, and Goldenberg briefed the US Armys counterterrorism unit. Prior to the rally in Richmond, the FBI arrested a number of Boogaloo boys who planned on inciting violence by shooting into the crowd.

There were going to be thousands of people there that were heavily armed, says Goldenberg. Had the Boogaloo boys fired into the crowd, it would have been a nightmare.

Fake photos and videos

A large percentage of fake news postings include faked or mis-attributed photos and videos.

In mid-January, at the height of the supply chain disruptions, a picture purporting to be from CityNews in Toronto was posted to both Facebook and Twitter. The picture showed a woman standing before empty supermarket shelves with the words, Empty Canadian Grocery Store Shevles (sic) Could Become a Larger Problem. The caption was used in another article, superimposed on the picture.

CityNews told Reuters: Our logo is being used on a photograph that is not ours and we didnt use the photo in our news coverage either. The image, in fact, was a stock photo from Getty taken in a British supermarket.

Since the Russian invasion of Ukraine there has been a veritable torrent of doctored or completely faked images. One shows the American actor Steven Seagal, whom Putin gave Russian citizenship to in 2016, in the uniform of the Russian army, for example.

Organisations like CNN, IIL, DFRL and NCRI have a number of ways of authenticating photos and videos. The first is the provenance of the image; seasoned analysts know which organisations can be trusted to release a true image or video. They also know what image passes the so-called smell test.

A second analytical tool available to these organisations is a reverse image search. Essentially, this involves entering the image into a search engine that scours the internet and databases looking for the same or a very similar image. As Andriukaitis explains, if you suddenly have an image of a Russian plane being shot down, a reverse image search might find the exact same image posted 10 years ago from the war in Syria.

As anyone who has scanned a document knows, digital photos are made up of dpi (dots per square inch) and on screen by pixels. There are a number of analytical programs that can determine whether the compression rate in one part of an image differs from the rest of the image. This is a tell-tale sign of an image being photo-shopped or otherwise altered.

Satellite imagery is used to authenticate photos of, for example, buildings and other large outside structures such as bridges. If someone is showing a photo of a burning building, we can use satellite images to look and find that building on a map and see if photos taken from space on that day show whether the building was, for example, on fire, Andriukaitis explains.

On 2 March, after some confusion about which building had been hit by a Russian missile, this method was used to determine that a building of Kharkiv National University that houses the sociology department and not the police station next door had been hit. The two buildings are architecturally similar.

Addressing social media blind spot

For more than four decades, before the creation of the IIL, UOs Professional Development Institute had run about a thousand courses for both public and private organisations, training some 10,000 people annually.

Among the organisations the Professional Development Institute worked with are the New York Police Department as well as the Washington DC Police Department to help them understand what disinformation is and how to identify its nefarious or insidious purpose and how it seeks to to divide, to devise, to distort, brew up dogmatic activity, or lead to violence, says Blais.

Most police leaders will tell you that they have a bit of a blind spot as to what goes on in social media, Blais told University World News.

They understand, for example, the back alleys of the neighbourhoods they patrol. They understand what is happening on the street. They know whos out there and who to watch for. But social media has evolved rather recently, very, very rapidly and very haphazardly and doesnt fit into traditional situational analysis, he says.

Blais, whose office at UO is a few short blocks from where the truckers set up camp on 29 January and shut down the centre of Canadas capital city, pointed to the so-called Freedom Convoy as an example of the police failing to take seriously information gleaned from social media and make it part of integrated threat analyses.

To be complete, police planners have to know, Blais says, whos bullying whom on social media to see where are the hotspots, whos calling for violence, whos calling for social unrest across multiple platforms and being heard by an audience numbering into the hundreds of thousands or even millions.

As both Blais and Luprecht emphasised, the thoughts of the leaders of the Freedom Convoy were freely available on the internet or, in the parlance of the field, their plans were open-sourced.

Everybody knew, my kids knew, that the trucks were coming to Ottawa. It took them a week to get here and they posted their plans, Blais says, alluding to the fact the convoy leaders like Pat King posted videos and gave interviews in which they said the truckers were prepared to shut down Ottawa until the government reversed the mandate that truckers coming into Canada had to be fully vaccinated against COVID-19.

The so-called memorandum of understanding the truckers released went further. It called for the dissolution of the government led by Prime Minister Justin Trudeau (that was re-elected last October) and its replacement by a committee that included members of the truckers leadership. Other postings threatened Trudeau directly. King, for example, posted a video on Streamable.com in which he openly said, Trudeau, someones going to make you catch a bullet someday.

For his part, Luprecht says of the truckers: They were 10 days coming right across the country. Its not like they just showed up overnight. We had open-source intelligence [that] made it clear from the beginning that they were here [in Ottawa] to stay. And from the beginning, some of them, not all of them, but some of them had some sort of seditious intent. Were here to bring down the government may not have been explicit, but they were here.

And yet, as has been widely reported, the Ottawa Police Service (OPS) as well as the Ontario Provincial Police (OPP) ignored this digital information and not only failed to stop the truckers from reaching the downtown, but effectively invited them into the downtown.

The OPS later explained that based on a protest last year, they expected the truckers to remain encamped at the foot of Parliament Hill for the weekend only. The occupation of Ottawa ended weeks later, on 20 February, after the police from the OPS, Royal Canadian Mounted Police, the OPP and more than 10 other jurisdictions moved in.

The dense lines in the topic network for the last week of the truckers protest contained in the NCRI Insights Report of 1 March indicate that the Russians and, likely, other state actors and non-state actors aligned with anti-Western governments, saw the truckers protest, or, to be more precise, Canadas seeming inability to deal with it effectively, as an opportunity to underscore the weakness of democratic countries.

These posts are part of the narrative advanced by the Russians, which, according to Luprecht, is that basically democracies dont work, that theyre completely dysfunctional.

Reviewing false information

When he turns to discussing fake news, Blais speaks candidly: Our role is not to counter every piece of bullshit that is out there. That would be impossible.

Blais would like to see what he calls a bottom-up effort to testify to the veracity of an image or posting. Modelled on the reviews used on, for example, Booking.com, this system would see platforms like Twitter, Facebook and YouTube include a true or false button that viewers can use to indicate whether a posting is factual. Ideally, he says, you would be able to attach a video or other posting that counters what an individual judges to be factually incorrect.

Even this real-time system would have struggled to cope with the story of there being secret US biolabs in Ukraine that, as Ottawa investigative journalist Justin Ling showed in a series of tweets, shot around the internet on 3 March.

Having been seeded by the Russians a few weeks earlier, on 3 March it became the subject of at least one QAnon video post as well as being featured by pro-Kremlin influencers on a number of platforms before Russian Foreign Minister Sergei Lavrov mentioned it in a press conference, also on 3 March, as being close to a casus belli.

The video, which was posted to TikTok, purported to identify the location of these secret sites. A posting to Twitter by someone who calls himself Dimitri Alperovitch (but who is not the chairman of the Washington DC-based think tank Silverado Policy Accelerator) is, according to Ling, known to be linked to QAnon. This tweet presented map overlays.

The first purported to show the location of the secret laboratories that had received US funding. The second was a map of Russian airstrikes. Ling deadpans the supposed coincidence, noting that were they to exist, such labs would almost certainly be in cities, and cities are Russias primary targets.

QAnons reasoning is, he shows, backwards causation: we know that these labs exist and Russias bombing and shelling campaign proves they do because the Russians are bombing and shelling cities.

On 3 March, the pro-Kremlin disinformation channel StalkerZone, which is linked to the separatist leaders in Donetsk (which Russia formally recognised as independent three days before invading Ukraine) posted four stories.

Among the titles are: What are Secret US Biolaboratories Doing in Ukraine?, The US Has Opened Dozens of Genetics Laboratories on the Russian Border: What are they Hiding? and, echoing Putins claims about Nazis in Zelenskyys government, The Nazi Origins of US Biolaboratories.

At 12.29pm Ottawa time (EST, the same as New York), Ling tweeted: This stuff is just popping up everywhere. Two and a half hours later, Ling tweeted that Vasily Prozorov, who purports to have been a contractor with the Ukrainian security services before defecting to Russia in 2019, claimed (earlier in the day) that the Russians had liberated the US biolab in Kherson (a city that fell to the Russians that day).

About the same time that Prozorov is said to have tweeted, Sergey Sudakov, a political scientist and regular on the state-run network Sputnik, tweeted that the US was working on a deadly virus in a biolab in Kharkiv. The post had already been viewed 160,000 times by the time Ling tweeted about it.

In a press conference in Moscow, late on 3 March, Russian Foreign Minister Lavrov repeated the fake news. We have data [to show] that the Pentagon is preoccupied about the chemical and biological installations in Ukraine because the Pentagon built two biological war labs and they have been developing pathogens there in Kievan [Kyiv] and in Odessa. And now they are concerned that they may lose control over these labs.

The importance of knowledge and context

Towards the end of our discussion, I ask Finkelstein and Goldenberg what professors who are not at universities with institutes devoted to fighting fake news can do.

Because the only thing thats capable of determining what is information is knowledge, we need knowledge about how to sort out what that [a meme or a piece of news on the web] is in context, says Finkelstein.

To understand information as it is packaged on social media platforms requires digital literacy and the historical context to identify misinformation. Were creating pathways for students to be exposed to a multidisciplinary mode of critical thinking that is designed to get outside the boxes, both in terms of being analysts and in terms of being outside disciplinary silos.

Perhaps because he was speaking from Vilnius, Lithuania, a scant 35km from the border of Russias only ally in Europe, Belarus, for all his faith in DFRLs analytical techniques to identify disinformation, distinguish between true and fake pictures, and understand the purpose of a disinformation campaign, Andriukaitis struck an almost fatalistic tone when I asked what he wanted to say directly to University World News readers.

Disinformation wars are happening at the moment. And I feel like they might be the prelude to bigger things.

After referring to the war in Ukraine and to the Chinese, who are now following the Russian digital disinformation playbook, he says: Information wars might be one step from actual wars, but we should not underestimate how serious disinformation wars are and how much damage they can cause.

Go here to see the original:
Education can help us stay ahead of the disinformation wars - University World News

Quantum computing: Definition, facts & uses – Livescience.com

Quantum computing is a new generation of technology that involves a type of computer 158 million times faster than the most sophisticated supercomputer we have in the world today. It is a device so powerful that it could do in four minutes what it would take a traditional supercomputer 10,000 years to accomplish.

For decades, our computers have all been built around the same design. Whether it is the huge machines at NASA, or your laptop at home, they are all essentially just glorified calculators, but crucially they can only do one thing at a time.

The key to the way all computers work is that they process and store information made of binary digits called bits. These bits only have two possible values, a one or a zero. It is these numbers that create binary code, which a computer needs to read in order to carry out a specific task, according to the book Fundamentals of Computers.

Quantum theory is a branch of physics which deals in the tiny world of atoms and the smaller (subatomic) particles inside them, according to the journal Documenta Mathematica. When you delve into this minuscule world, the laws of physics are very different to what we see around us. For instance, quantum particles can exist in multiple states at the same time. This is known as superposition.

Instead of bits, quantum computers use something called quantum bits, 'qubits' for short. While a traditional bit can only be a one or a zero, a qubit can be a one, a zero or it can be both at the same time, according to a paper published from IEEE International Conference on Big Data.

This means that a quantum computer does not have to wait for one process to end before it can begin another, it can do them at the same time.

Imagine you had lots of doors which were all locked except for one, and you needed to find out which one was open. A traditional computer would keep trying each door, one after the other, until it found the one which was unlocked. It might take five minutes, it might take a million years, depending on how many doors there were. But a quantum computer could try all the doors at once. This is what makes them so much faster.

As well as superposition, quantum particles also exhibit another strange behaviour called entanglement which also makes this tech so potentially ground-breaking. When two quantum particles are entangled, they form a connection to each other no matter how far apart they are. When you alter one, the other responds the same way even if they're thousands of miles apart. Einstein called this particle property "spooky action at a distance", according to the journal Nature.

As well as speed, another advantage quantum computers have over traditional computers is size. According to Moore's Law, computing power doubles roughly every two years, according to the journal IEEE Annals of the History of Computing. But in order to enable this, engineers have to fit more and more transistors onto a circuit board. A transistor is like a microscopic light switch which can be either off or on. This is how a computer processes a zero or a one that you find in binary code.

To solve more complex problems, you need more of those transistors. But no matter how small you make them there's only so many you can fit onto a circuit board. So what does that mean? It means sooner or later, traditional computers are going to be as smart as we can possibly make them, according to the Young Scientists Journal. That is where quantum machines can change things.

The quest to build quantum computers has turned into something of a global race, with some of the biggest companies and indeed governments on the planet vying to push the technology ever further, prompting a rise in interest in quantum computing stocks on the money markets.

One example is the device created by D-Wave. It has built the Advantage system which it says is the first and only quantum computer designed for business use, according to a press release from the company.

D-wave said it has been designed with a new processor architecture with over 5,000 qubits and 15-way qubit connectivity, which it said enables companies to solve their largest and most complex business problems.

The firm claims the machine is the first and only quantum computer that enables customers to develop and run real-world, in-production quantum applications at scale in the cloud. The firm said the Advantage is 30 times faster and delivers equal or better solutions 94% of the time compared to its previous generation system.

But despite the huge, theoretical computational power of quantum computers, there is no need to consign your old laptop to the wheelie bin just yet. Conventional computers will still have a role to play in any new era, and are far more suited to everyday tasks such as spreadsheets, emailing and word processing, according to Quantum Computing Inc. (QCI).

Where quantum computing could really bring about radical change though is in predictive analytics. Because a quantum computer can make analyses and predictions at breakneck speeds, it would be able to predict weather patterns and perform traffic modelling, things where there are millions if not billions of variables that are constantly changing.

Standard computers can do what they are told well enough if they are fed the right computer programme by a human. But when it comes to predicting things, they are not so smart. This is why the weather forecast is not always accurate. There are too many variables, too many things changing too quickly for any conventional computer to keep up.

Because of their limitations, there are some computations which an ordinary computer may never be able to solve, or it might take literally a billion years. Not much good if you need a quick prediction or piece of analysis.

But a quantum computer is so fast, almost infinitely so, that it could respond to changing information quickly and examine a limitless number of outcomes and permutations simultaneously, according to research by Rigetti Computing.

Quantum computers are also relatively small because they do not rely on transistors like traditional machines. They also consume comparatively less power, meaning they could in theory be better for the environment.

You can read about how to get started in quantum computing in this article by Nature. To learn more about the future of quantum computing, you can watch this TED Talk by PhD student Jason Ball.

Read the original:
Quantum computing: Definition, facts & uses - Livescience.com

Fraunhofer IPMS part of a national project to develop the first German Quantum Computer – Scientific Computing World

Together with 24 German research institutions and companies, the Fraunhofer Institute for Photonic Microsystems (IPMS) is working on a quantum computer with improved error rates in the collaborative project QSolid coordinated by Forschungszentrum Jlich.

The goal is to make Germany a leader in the field of quantum technology and thus to maintain its independence and open up numerous new applications in science and industry. The Federal Ministry of Education and Research has allocated 76.3 million in funding for the next five years.

Dr Benjamin Lilienthal-Uhlig, business unit manager for Next Generation Computing at Fraunhofer IPMS states: We intend to use our know-how and infrastructure to enable scalable quantum processors that build on the achievements and advantages of silicon-based semiconductor manufacturing.

This concerns, for example, manufacturing processes like deposition and nanopatterning or wafer-scale electrical characterization. Together with GLOBALFOUNDRIES and Fraunhofer IZM-ASSID an interposer technology will be developed focusing on high density superconducting interconnects and thermal decoupling through advanced packaging, added Lilienthal-Uhlig.

Fraunhofer IPMS is part of the newly launched German funded project QSolid (Quantum Computer in the solid state). The project centres on quantum bits or qubits for short of very high quality, i.e. with a low error rate. The quantum computer will be integrated into Forschungszentrum Jlichs supercomputing infrastructure at an early stage and will contain several next-generation superconducting quantum processors, including a moonshot system that has been proven to exceed the computing power of conventional computers. The first demonstrator will go into operation in mid-2024 and will make it possible to test applications as well as benchmarks for industry standards.

Fraunhofer IPMS Center Nanelectronic Technologies contributes a 4000 m clean room and its expertise in state-of-the-art, industry-compatible CMOS semiconductor fabrication on 300 mm wafer standard. Additionally, cryogenic characterization of Globalfoundries CMOS technology for scalable control will be studied, explains Lilienthal-Uhlig.

Original post:
Fraunhofer IPMS part of a national project to develop the first German Quantum Computer - Scientific Computing World

Why banks and NATO are worrying about a future Quantum attack – The Indian Express

Investment and new milestones in quantum computing are bringing the prospect of an ultra-powerful computer that can crack any code closer to reality. Alphabet Incs Google and International Business Machines Corp. are racing to increase the number of qubits the quantum equivalent of bits that encode data on classical computers on a quantum chip. Firms like Canadas D-Wave Systems Inc. and French startup Alice&Bob are offering quantum computing services to clients that want broad processing power to solve complex problems.

But any technological advance comes with concerns. While a fully-fledged quantum computer doesnt appear to exist yet, there is already worry about its ability to crack encryption underpinning critical communications between companies and between armed forces.

Andersen Cheng, founder and chief executive officer of London quantum-encryption firm Post Quantum, joined me on Twitter Spaces on Wednesday to talk about why NATO, banks and other entities need to prepare for a world where quantum attacks are possible. Here is an edited transcript of our conversation.

Parmy Olson: How significant is the prospect of quantum computers usurping the machines we use today?

Andersen Cheng: Its going to impact every single one of us. I trained as a computer auditor over 30 years ago so I have seen enough in cybersecurity, and the biggest existential threat we are facing now is a quantum attack. Remember a few months ago when Facebook, WhatsApp and Instagram went dark for a few hours? Imagine if they went dark and never came back up? Or what if we couldnt buy our stuff on Amazon? That is the thing we have to worry about in terms of what a quantum machine can do.

One thing that is now emerging is the possibility of a quantum machine that can also crack encryption. When a quantum machine comes in, itll be like an x-ray machine. A hacker no longer needs to steal my wallet. All they have to do is to go to the lock on your front door and take an X-ray image of it. They then know what the key looks like and can replicate it.

PO: Machines today cant crack the encryption underpinning networks like Facebook Messenger, WhatsApp and Signal. Can the quantum-computing services provided by IBM or D-Wave already do that?

AC: No. We cannot tell at this point if someone has already got the first functioning quantum machine somewhere. All the computers were using today are what we call classical computers. A quantum machine cannot do very complicated computation, but it can do millions of tries in one go. A quantum machine is useless in doing 99% of the work that we see today, but its extremely fast in doing many very simple tries simultaneously.

The opinion has been that this machine is 10 to 20 years away. But in the intelligence world, people are now worried it will be within five years. Theres been more urgency in the last two and a half years. This is why you see a lot more initiatives going on now in terms of claiming quantum supremacy. Nation states have put billions of dollars into building a quantum machine. There have been several lab-based breakthroughs in the past few years, which have got people worried.

PO: Lets say somebody gets hold of a quantum computer that can break encryption. What could they do?

AC: One option is a harvest-now-and-decrypt-later attack. Right now Im using my iPhone, using a public key that is encrypted. If someone is trying to intercept and store our information, they are just harvesting it. They cannot decrypt it today. But one day they could open up all the secrets [with a quantum computer].

PO: NATO has started experimenting with your virtual private network which has quantum encryption embedded into it. Why are they trialing this?

AC: The current algorithms we use inside a VPN (a tool used to securely tunnel into a corporate network or through a national firewall) either use a standard from RSA Laboratories or elliptic-curve cryptography. Neither are quantum safe.

PO: Meaning they could be cracked by a quantum computer?

AC: Correct. If you start collecting my data, one day with a quantum machine you could actually crack [the passwords protecting it]. That is the worry from a lot of organizations. NATO has got 30 members states so interoperability is important. If you send allied troops into Ukraine, they have to talk to each other. Since different armies use different communication protocols, you have to think about the harvest-now-decrypt-later risk. So this is why they are at forefront of looking for a quantum-safe solution.

PO: What else is at risk from a quantum attack?

AC: Bitcoin and the blockchain. I would say 99% of all cryptocurrencies are using elliptic-curve cryptography, which is not quantum safe. Whoevers got the first working machine will be able to recover hundreds of billions of dollars worth of cryptocurrency.

PO: Which countries are on the forefront of using quantum encryption?

AC: Canada (where quantum computing firm D-Wave Systems is based) is at the forefront of quantum innovation. Then Australia, the Netherlands, France, the U.K. and then you have the U.S. In 2017, Donald Trump made an executive order for a $1.2 billion quantum computing initiative. Thats actually nothing compared to other nation states. China has openly committed between $12 billion and $15 billion to quantum supremacy. France has committed 1.8 billion euros ($2 billion) to quantum.

PO: What about the commercial sector?

AC: The American commercial sector has been very innovative with quantum computing, including Google, IBM, Honeywell International Inc.

I cannot name names but some of the largest banks are all quietly building up what we call the PQC teams, or the post-quantum crypto teams, to prepare for the migration. Some of them do see it as an existential threat and they also see it as a marketing advantage to tell customers they are quantum-safe. I know one of the largest systems integrators in the world has committed $200 million to build out a quantum consulting division. They see this as like Y2K happening every month in the next 10 years.

PO: Y2K refers to when everybody thought the worlds computers would blow up when the date changed on Jan. 1, 2000.

AC: It was a once-in-a-lifetime event which did not happen. I was working for JP Morgan Chase & Co. at the time on the Y2K migration committee. Three days after Jan. 1, Sandy Warner, then-CEO, sent an email to every employee saying, Wow, we only spent $286 million on Y2K and nothing happened, so we are very pleased.

PO: How much of the worries over quantum are being overblown by consultants keen to earn fees to set up these new systems? Bearing in mind youre in this market too.

AC: The consultants are thinking Christmas has come early. Everyones been procrastinating until NIST (Maryland-based National Institute of Standards and Technology) updated its standards to include quantum cryptography. I believe the first wave of huge revenues will go to consulting firms, and then the next wave will come down to vendors like us.

Here is the original post:
Why banks and NATO are worrying about a future Quantum attack - The Indian Express

Schrdingers cat and the worry of a quantum apocalypse ahead – Mint

Let me try distracting you from war and disease with a joke. Schrdinger takes his cat to the vet for a check-up. The vet comes back 10 minutes later and says, Well, I have good news and bad news.. If you snickered at this, you know a bit about the Schrdingers Cat paradox, and therefore perhaps a little bit about quantum physics. For those who did not, the paradox explains the seeming contradiction between what we see with our naked eye and what quantum theory tells us actually exists in its microscopic state. The Copenhagen interpretation of quantum mechanics states that a particle exists in all states at once until observed. Schrdingers cat is in a box, and could be alive or dead. But till the box is opened, you would not be able to know. Thus, the vets quandary.

This principle, among others, powers one of the most exciting and bleeding- edge advances in technology: Quantum computing. I have written about it before in Mint, but to summarize: Our current powerful computers follow the principles of the Turing machine, where information is encoded in bits (1 and 0) and a series of operations (and, or, not, etc) make these bits compute. A quantum computer uses qubits or the quantum version of bits; a qubit is not permanently a 0 or 1, but it can be both at the same time. Only at the end of the computation (when the box is opened), can you know whether its 0 or 1. During the computation process, its exact state is indeterminate and can contain bits of both. If this whooshed over your head, console yourself with what Bill Gates said in a 2017 interview: I know a lot of physics and a lot of math. But the one place where they put up slides and it is hieroglyphics, its quantum."

A quantum computer can exploit these properties of quantum physics to perform certain calculations far more efficiently and faster than any computer or supercomputer, inspiring the likes of Microsoft, IBM and Google to work feverishly on this form of computing. This is especially urgent because Moores Law is flattening but our problems are becoming more complex: climate change, artificial general intelligence, drug personalization. While this is super exciting, a recent BBC article (bbc.in/3pA7pIY ) about the quantum apocalypse made me pause.

As a hidden force behind e-commerce, online banking and trading, crypto trading, social networking and internet messaging, almost everything we do involves encryption. Most encryption uses public and private keys, and that in turn uses arcane mathematical calculations involving prime numbers. Using a Turing computer to crack this encryption is virtually impossible. It would take thousands of years. However, a quantum computer can potentially do this in mere seconds. Every minute, huge amounts of encrypted data is harvested without our knowledge and stored in vast data banks, waiting for the day that it can finally be decrypted. Today, there is nothing data thieves can do with this treasure trove, but once a functioning quantum computer appears that will be able to break that encryption... it can almost instantly create the ability for whoevers developed it to clear bank accounts, to completely shut down government defence systemsBitcoin wallets will be drained." says lyas Khan, chief executive of Quantinuum. Moreover, current encryption methods will be useless, halting online banking transactions, e-commerce, social media interactions, everything. The security of every public blockchain will be under threat from quantum computing power, since it relies on heavy duty cryptography; it was no coincidence that the price of Bitcoin dropped sharply the day Google made its announcement of achieving quantum supremacy a year ago. It was a portent of the quantum apocalypse.

The world is gearing up for this post-quantum world. Google, Microsoft, Intel and IBM are working on solutions. So are specialist startups like Post-Quantum and Quantinuum. The UK government claims that all its top-secret data is already post-quantum. The BBC talks of a beauty parade taking place to establish a standardised defence strategy that will protect industry, government, academia and critical national infrastructure against the perils of the quantum apocalypse." New cryptographic methods like quantum key distribution are being developed, by which even if the message gets intercepted, no one can read it, much like the cat.

All this will not be cheap, nor will it be easy. But we have no choicemost of our world runs digitally now and its wheels need to be kept humming. To do that, we need to think out of the box.

Jaspreet Bindra is the chief tech whisperer at Findability Sciences, and learning AI, Ethics and Society at Cambridge University.

Subscribe to Mint Newsletters

* Enter a valid email

* Thank you for subscribing to our newsletter.

Never miss a story! Stay connected and informed with Mint. Download our App Now!!

Continue reading here:
Schrdingers cat and the worry of a quantum apocalypse ahead - Mint