A Russian man accused of hacking LinkedIn, Dropbox, and Formspring in 2012 and possibly compromising personal details of over 100 million users, has pleaded not guilty in a U.S. federal court after being extradited from the Czech Republic. Yevgeniy Aleksandrovich Nikulin, 30, of Moscow was arrested in Prague on October 5, 2016, by Interpol agents working in collaboration with the FBI, but he was recently extradited to the United States from the Czech Republic on Thursday for his first appearance in federal court. Nikulin's arrest started an extradition battle between the United States and Russia, where he faces significantly lesser criminal charges of stealing $3,450 via Webmoney in 2009. But the Czech Republic ruled in favor of the United States. In the U.S., Nikulin is facing: 3 counts of computer intrusion 2 counts of intentional transmission of information, code, or command causing damage to a protected computer 2 counts of aggravated identity theft 1 count of trafficking in unauthorized access devices 1 count of conspiracy According to the maximum penalties for each count, Nikulin faces a maximum of 32 years in prison and a massive fine of more than $1 Million.
On this episode of Recode Decode, hosted by Kara Swisher, Carnegie Mellon's Andrew Moore talks about the future of tech education as fields like artificial intelligence and machine learning take center stage. Moore, the dean of CMU's computer science school, says he's "concerned" that anti-immigrant fervor will deter the next generation of great computer scientists from coming to America, although CMU has not yet seen an impact on its application numbers. "I think it's short-term, and I haven't seen any craziness, though of course, I'm frightened that it'll happen -- on this question of getting really the strongest folks over," Moore said. "If we appear to have a society which doesn't welcome folks from elsewhere then of course any sane brilliant scientist will end up going to Canada or Singapore or Zurich because they'll be able to get the best of both worlds." "Once you're living in an academic community or in a software development office for an exciting company, usually in day-to-day interactions this doesn't come up," he added. "You're so focused on some particular mission. But that perception -- especially among someone who's maybe 16 or 17 in anywhere from Turkey to China to England -- is something I'm concerned about." On the new podcast, he also talks about the often-forgotten importance of electrical and computer engineers, who will develop the sensors that make machine learning advance; how educational programs have been complicit in the lack of diversity in tech; and why he's personally pessimistic that self-driving cars, one of Carnegie Mellon's areas of expertise, will be ready by the early 2020s, as some have predicted. You can listen to Recode Decode on Apple Podcasts, Spotify, Pocket Casts, Overcast or wherever you listen to podcasts. Below, we've shared a lightly edited transcript of Kara's full conversation with Andrew. Kara Swisher: Today, I'm delighted to have Andrew Moore on the podcast. He's the dean of Carnegie Mellon's School of Computer Science, which was ranked No. 1 in the world by U.S. News and World Report. And he was previously a vice president of engineering at Google where he was in charge of Google Shopping. Andrew Moore: Happy to be here, thank you. I wanna get your background. I've had various computer scientists on the show who are teaching and like that, and I'd love to get sort of the academic perspective, but you've been in the fray, also. So just let's give your background, where you came from and how you got to Carnegie Mellon and then we'll talk about what's going on there. I grew up in a seaside town called Bournemouth in South of England, and there, in the late '80s, I really got into creating video games, like a lot of kids at the time.
Facebook today named the recipients of 22 servers that Facebook designed specifically for artificial intelligence (A.I.) research. This comes after Facebook's introduction of the giveaway program for academic researchers back in February. University departments in Austria, Belgium, the Czech Republic, France, Germany, Italy, Russia, Switzerland, and the United Kingdom are getting the machines, the designs of which Facebook open-sourced in December. The servers can support as many as eight graphics processing units (GPUs), which are often used to train artificial neural networks (ANNs) with lots of data. After being trained, the ANNs can make inferences on new data.
A multi-pronged data analysis approach that can strengthen the security of Internet of Things (IoT) devices--such as smart TVs, home video cameras and baby monitors--against current risks and threats has created by a team of Penn State World Campus students pursuing master of professional studies degrees in information sciences. "By 2020, more than 20 billion IoT devices will be in operation, and these devices can leave people vulnerable to security breaches that can put their personal data at risk or worse, affect their safety," said Beulah Samuel, a student in the Penn State World Campus information sciences and technology program. "Yet no strategy exists to identify when and where a network security attack on these devices is taking place and what such an attack even looks like." The team applied a combination of approaches often used in traditional network security management to an IoT network simulated by the University of New South Wales Canberra. Specifically, they showed how statistical data, machine learning and other data analysis methods could be applied to assure the security of IoT systems across their lifecycle.
By now, many Internet users know that hackers can compromise the webcam on a laptop or other computing device so that it records video without the owner's knowledge. As a safety measure, security researchers, our regular readers and even Facebook's Mark Zuckerberg all put tape over their webcams, blocking the hackers' potential view. To that group of privacy-conscious Internet users we can now add the pope, who has proven his social media chops but evidently has a knack for online security, as well. A photo spread Tuesday by Collin Anderson, a hacking researcher, showed Pope Francis using an iPad with tape applied over the camera. The photo was originally taken in 2015 during the pope's noon prayer at the Vatican in which he used the tablet to register for a World Youth Day event in Poland.