Page 1,521«..1020..1,5201,5211,5221,523..1,5301,540..»

Former Athens resident pleads guilty in $3.3 billion cryptocurrency fraud

A Hall County manwho once resided in Athens recentlypleaded guilty in U.S. District Court in New York to the largest cryptocurrency theft in U.S. history.

James Zhong, 30, of Gainesville last week pleaded guilty to committing wire fraud, according to the U.S. Attorney in New York. Facing 20 years in prison, Zhongwill be sentenced on Feb. 22, 2023.

The investigation into Zhongs Bitcoin finances led to a November 2021 search of Zhongs home in Gainesville that resulted in the seizure of more than $3.36 billion in Bitcoin, described by the U.S. Attorney as the largest financial seizure ever by the Internal Revenue Service.

Scary landing: 'I really got scared': South Carolina pilot loses power in sky, steers plane to Athens

Oconee Blotter: Suspicious drone monitors homes in neighborhood

When federal investigators searched Zhongs home they also seized Bitcoin in an underground floor safe, bitcoin loaded on a computer that was hidden inside a popcorn tin, along with $661,900 cash and 11 1-ounce bars of silver and gold.

Zhong was living on Ruth Street in Athens in March 2019, when he reported his home was burglarized while he was out of town between March 7-13. He came home to discover a window in a rear bedroom shattered and the thief had found a brief case that contained $400,000 cash and a USB thumb drive with personal information, according to the police report.

Zhong told the police officer he felt the person who stole the money apparently knew him because he had hidden the brief case behind an air vent.

Police Lt. Shaun Barnett said Tuesday that the cash was never recovered, nor was a suspect identified. However, he said the burglary and amount of money reported stolen "raiseda red flag with the IRS.

Shot and run over: Hartwell man found shot, body dumped on Hart County road, says sheriff

Killer caught: Murder suspect jailed in death of Athens teen; woman's slaying unresolved

Federal investigators said Zhong originally stole the Bitcoin by going into the Silk Road dark web marketplace, according to the report.

Silk Road is an online black market used by drug dealers and others to distribute illegal drugs and goods to buyers, according to the U.S. Attorney. Silk Road was created by an Austin, Texasnativewho is now serving life in prison.

James Zhong committed wire fraud over a decade ago when he stole approximately 50,000 Bitcoin from Silk Road. For almost 10 years, the whereabouts of this massive chunk of missing Bitcoin had ballooned into an over $3.3 billion mystery, U.S. Attorney Damian Williams said in a statement released Monday. ... Thanks to state-of-the art cryptocurrency tracing and good old-fashioned police work, law enforcement located and recovered this impressive cache of crime proceeds."

Original post:
Former Athens resident pleads guilty in $3.3 billion cryptocurrency fraud

Read More..

Post-Quantum Cryptography | CSRC – NIST

The Candidates to be Standardized and Round 4 Submissions were announced July 5, 2022. NISTIR 8413, Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process is now available.

NIST initiated a process to solicit, evaluate, and standardize one or more quantum-resistant public-key cryptographic algorithms.Full details can be found in the Post-Quantum Cryptography Standardization page.

In recent years, there has been a substantial amount of research on quantum computers machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale quantum computers are ever built, they will be able to break many of the public-key cryptosystems currently in use. This would seriously compromise the confidentiality and integrity of digital communications on the Internet and elsewhere. The goal of post-quantum cryptography (also called quantum-resistant cryptography) is to develop cryptographic systems that are secure against both quantum and classical computers, and can interoperate with existing communications protocols and networks.

The question of when a large-scale quantum computer will be built is a complicated one. While in the past it was less clear that large quantum computers are a physical possibility, many scientists now believe it to be merely a significant engineering challenge. Some engineers even predict that within the next twenty or so years sufficiently large quantum computers will be built to break essentially all public key schemes currently in use. Historically, it has taken almost two decades to deploy our modern public key cryptography infrastructure. Therefore, regardless of whether we can estimate the exact time of the arrival of the quantum computing era, we must begin now to prepare our information security systems to be able to resist quantum computing.

Originally posted here:
Post-Quantum Cryptography | CSRC - NIST

Read More..

Machine Learning in Oracle Database | Oracle

Oracle Machine Learning AutoML User Interface

A no-code user interface supporting AutoML on Oracle Autonomous Database to improve both data scientist productivity and non-expert user access to powerful in-database algorithms for classification and regression.

Accelerate machine learning modeling using Oracle Autonomous Database as a high performance computing platform with an R interface. Use Oracle Machine Learning Notebooks with R, Python, and SQL interpreters to develop machine learningbased solutions. Easily deploy user-defined R functions from SQL and REST APIs with data-parallel and task-parallel options.

Data scientists and other Python users accelerate machine learning modeling and solution deployment by using Oracle Autonomous Database as a high-performance computing platform with a Python interface. Built-in automated machine learning (AutoML) recommends relevant algorithms and features for each model, and performs automated model tuning. Together, these capabilities enhance user productivity, model accuracy, and scalability.

Data scientists and data analysts can use this drag-and-drop user interface to quickly build analytical workflows. Rapid model development and refinement allows users to discover hidden patterns, relationships, and insights in their data.

See more here:
Machine Learning in Oracle Database | Oracle

Read More..

Ukraine Launches Crowd Funding Drive for $250K Naval Drones

Screenshot from United24 website.

Ukraine has put out an international call to crowd-fund a fleet of 100 domestically built sea drones like the ones used in a late October attack on Russian Navy ships in the Black Sea.

On Friday, President Volodymyr Zelensky lent support to the United24 online campaign to solicit donations to build 100 of the naval drones that cost about $250,000 apiece.

We must defend the waters of our seas and peaceful cities from Russian missiles launched from ships, Zelenskiy wrote on the Telegram messaging app, reported Reuters.

The explosive-laden drones were used in an attack on Russian warships guided-missile Admiral Makarov and mine countermeasures shipIvan Golubets on Oct. 29. Video released from the drones showed one approaching Makarov and another was shown dodging fire from a Russian helicopter. At the time, Ukraine did not confirm or deny its involvement in the attack.

Following the attack, the Russian Black Sea Fleet has been kept mostly in port, USNI News reported on Monday.

During the larger attack on Oct. 29, several of the USVs penetrated the harbor. Drones eye footage released shows them operating near the warship piers deep inside the base. Russian reports that the drones reached Pivdenna Bay suggest that they got close to the submarines. A single Kilo-class submarine was present at the time, USNI News reported.

The United24 campaign outlined additional roles for the sea drones including shepherding grain shipments from Ukraine.

Drones can participate in long-range maritime reconnaissance and coastal surveillance, escorting and supporting the traditional fleet, convoying merchant ships, zoning in artillery fire, defending our bases and countering amphibious operations, reads the website United24.

The United24 campaign released additional details on the drones. The craft are 18 feet long, can carry up to 440 pounds in payload, has a range of about 500 miles and is capable of speeds of up to 50 mph.

The unmanned surface vehicles were first seen publicly on social media in September when one washed ashore near the Russian Navy base on the Crimean Peninsula.

H I Sutton Image used with permission

USNI News contributor H I Sutton contributor highlighted other features of the drone, including components from a Sea Doo recreational watercraft with a repurposed contact fuse from a Soviet-era bomb linked to an explosive payload.

In a statement, Zelensky asked for international support to grow the inventory of sea drones.

I am sure that millions of people will support this important area of Ukraines defense,hewrote of the naval drone fundraising campaign. Everyone has already seen how it works.

Related

Here is the original post:
Ukraine Launches Crowd Funding Drive for $250K Naval Drones

Read More..

Computer Science | Portland State University

NEW! - Open Faculty Positions in Cybersecurity, Privacy, Trusted Systems

The Department of Computer Scienceoffers a full range of courses and degree programs. Our programs, in addition to the opportunities to develop professional skills through MECOP and PCEP, are designed to provide students with the educational background to achieve a career in the computing industry. With over 800 undergraduate CS majors and almost 200 graduate students, we offer a community to learn, discover, innovate, and share a curriculum based on the application and theoretical foundations of Computer Science.

The departmentis home to 31regular faculty members who specialize in a variety of research areas such as computer graphics and vision, computer security, databases, intelligent systems, programming languages, software engineering, open source software, sensor networks, and high performance computing.

We invite you to join our Computer Science community and to explore our programs!

Department Office Hours:

The department is operating during regular hours but, due to the pandemic, we are relying on virtual meetings, except for absolutely critical activities. Please contact an appropriate person on the list below if you need help via email or if you would like to arrange a time for a phone call or an in-person or online meeting:Undergraduate Advising:uccs@pdx.eduGraduate Advising:gccs@pdx.eduDepartment Manager:sarreal@pdx.eduDepartment Chair:mpj@pdx.eduDepartment Services Coordinator: elisa.salgado@pdx.eduCS Office:csoffice@pdx.edu

We look forward to hearing from you andwill do our best to respond as soon as we can.

Computer Science is one of five departments within theMaseeh College of Engineering and Computer Science. At the Maseeh College, we offer academic programs that provide transformative opportunities within the classroom and beyond. If you join our college, you'll be connected to Portlands growing, innovative industries and prepared to gain competitive jobs in engineering and computer science. Our close ties to leading tech companies give you the opportunity to build your professional skills through internship programs while you complete your degree. You can participate in research, community-based learning projects and opportunities to develop your own ideas from proposal to prototype through our innovation programs. Our students are in demand in the Portland job market and beyond, and they report the highest annual earnings of all PSU graduates one year after graduation.

8.3.0

Read the rest here:

Computer Science | Portland State University

Read More..