Jahon Jamali is a leading expert on emerging technologies, global risk management and international relations. He began his career as a U.S. Intelligence Officer with the Defense Intelligence Agency. He also has extensive experience in the high tech community creating and growing startups through to successful exits. All this makes him an even more credible authority when it comes to seeking the trends that are moving technology, business and government operations forward. This discussion examines the role of Bitcoin and Ethereum in finance today and the especially important need for cryptocurrencies to provide a trust layer for the Internet.
Commerce Secretary Raimondo Urges Passage of CHIPs Act, Praises Samsung $17B Fab and Updates on Agency’s Chip Policy
Gina M. Raimondo, U.S. Department of Commerce Secretary, recently urged Congress to pass the CHIPs Act, which she argues will enhance U.S. competitiveness, strengthen national defense and create high wage, high skilled jobs. A recent presentation in Detroit by the Commerce Secretary, “Investing in American Manufacturing and Closing the Innovation Divide,” was designed for auto industry executives hit hard by the semiconductor shortage that is only getting worse. Recent policies are further positive signs that the chip shortage and the need to strategically increase domestic chip production are being taken seriously by the Commerce Secretary and her org chart at the agency.
Global IT Supply Chain Disruptions Should Bolster Innovation and Cybersecurity with North American Allies
Global IT supply chain disruptions (ransomware, semiconductor shortages) necessitate business leaders and policymakers to take a fresh look at the Information Communications Technology (ICT) and Cybersecurity Strategy for North America. What are the ICT innovation and investment climates in Mexico and Canada? Is ICT investment part of the solution for the creation of regional economic development initiatives in Central America? ICT and Cybersecurity “trade” agreements need to take center stage in all multilateral policy interactions in the hemisphere in the next few years. Ryan Berg from the Center for Strategic and International Studies (CSIS) has released a timely report on these issues.
Iran-Israel Cyber Conflict Shows Leadership Needed to Curb Critical and Civilian Infrastructure Targeting
Over the course of several months, Israel is suspected of perpetrating several attacks that have disrupted key services in Iran. Not one to play victim, Iran has been retaliating in its own way, targeting Israeli targets as well. While the two countries have engaged one another covertly in most domains (air, land, sea, and cyberspace), for the past year both have appeared to move away from traditional symbols of state power such as military sites, individuals of interest, or government facilities, to civilian infrastructure. The intent of these attacks is quite clear: to inflict pain on the civilian communities in their respective countries in a show that neither government can protect them.
NIST Cybersecurity Framework Gains Private Sector Traction and Other Noteworthy Cyber Efforts from the Institute
In our recent OODA Loop Stratigame – Scenario Planning for Global Computer Chip Supply Chain Disruption – in all four scenarios we determined that public-private partnership in the cybersecurity marketplace, including the establishment of industry-wide frameworks and standards, will be crucial. Organizations like the National Institute of Standards and Technology (NIST) will figure prominently in such efforts – and that means scanning the horizon for worthwhile government cybersecurity efforts which make sense for your company’s design innovation process, business models, and ideas around value creation and capture. To start, there is plenty of activity over at NIST related to cybersecurity worth a review.
Ohio-based DNA Diagnostics Center (DDC) recently reported that in August 2021, the company detected potential unauthorized access to its network, during which there was unauthorized access and acquisition of an archived database that contained personal information collected between 2004 and 2012. There are issues with security associated with life sciences data. We hit some very big ones here.
The CalTech Space-based Solar Power Project (SSPP) approaches a significant milestone in developing technology capable of generating solar power in space and beaming it back to Earth: A test launch of prototypes that collect sunlight and convert it to electrical energy and transfer energy wirelessly in free-space using radio frequency (RF) electrical power. SPSS’s first test will occur in early 2023. NASA also has a major benchmark in solar-powered space travel approaching. In August 2022, a NASA probe called Psyche will set out to explore a giant metallic asteroid called Psyche 16. Solar power will help propel Psyche into deep space and will be among the first of NASA’s deep-space missions to use solar energy for both onboard operations and propulsion.
The National Cyber Security Centre (NCSC), a part of Government Communications Headquarters (GCHQ), was created in 2016 as part of the UK’s 5-year National Cyber Security Strategy. Self-described as “the UK’s technical authority for cyber security,” the NCSC has put out an annual review every year since its inception. In this year’s report, “Annual Review 2021: Making the UK the safest place to live and work online”, the NCSC, as part of a national security agency, is unable to disclose all its work publicly, but seeks in the annual review “to describe the year with insights and facts from colleagues inside and out of the organization.”
Welcome to the 2021 edition of my top 10 books of the year list. This year’s list includes 8 non-fiction and 2 fiction books as I believe fiction can always inform our perspectives on security, technology, and business. If I had to define one theme for this year, I would say it is “disruption” as many of the books that resonated with me dealt with past, current, and future disruption. In fact, this year I also developed a new presentation entitled “Surviving Exponential Disruption” so it is clear I’ve got disruption on my mind.
Google’s Cybersecurity Action Team was launched in early October of this year, as part of the company’s $10 billion pledge to strengthen cybersecurity, all of which grew out of the launch in August, by CISA Director Jen Easterly, of the CISA JCDC (Joint Cyber Defense Collaborative). Google is a partner company with CISA in the JCDC. The Cybersecurity Action Team’s efforts begin with Google Cloud. They recently released their first publicly available intelligence offering – Threat Horizons, Cloud Threat Intelligence, November 2021, Issue 1.