Page 2,611«..1020..2,6102,6112,6122,613..2,6202,630..»

Insights on the Cloud Security Global Market to 2025 – Featuring Microsoft, Cisco Systems, Proofpoint and McAfee – GlobeNewswire

Dublin, June 25, 2021 (GLOBE NEWSWIRE) -- The "Global Cloud Security Market: Size & Forecast with Impact Analysis of COVID-19 (2021-2025)" report has been added to ResearchAndMarkets.com's offering.

This report provides an in-depth analysis of the global cloud security market by value, by service model, by organization size, by application, by region, etc. The report presents a regional analysis of the cloud security market, including the following regions: North America (The US, and Rest of North America); Europe; Asia Pacific; Middle East & Africa; and Latin America.

The report also provides a detailed analysis of the COVID-19 impact on the cloud security market.

The report also assesses the key opportunities in the market and outlines the factors that are and will be driving the growth of the industry. Growth of the overall global cloud security market has also been forecasted for the period 2021-2025, taking into consideration the previous growth patterns, the growth drivers and the current and future trends.

The global cloud security market is highly fragmented with many major market players operating worldwide. The key players of the cloud security market - Microsoft Corporation, Cisco Systems, Inc., Proofpoint, Inc., and McAfee Corp. - are also profiled with their financial information and respective business strategies.

Regional Coverage

With the rapid evolution of the internet, privacy is considered to be the crucial element for each and every individual. As more and more people using internet, the vulnerability to cyber attacks has increased manifolds. Therefore, the use of cloud security has become extremely essential for everyone in order to protect the sensitive data.

Cloud security refers to the set of technologies, policies, controls, and services that secure cloud computing environments, applications, and infrastructure from cyber security threats. Cloud security is a form of cyber security.

The cloud security market can be segmented on the basis of security type, solution type, service model, deployment model, organization type, and application.

The global cloud security market has increased significantly during the years 2018-2020 and projections are made that the market would rise in the next four years i.e. 2021-2025 tremendously.

The cloud security market is expected to increase due to the growing prevalence of cyber attacks, rising deployment of cloud-based platforms, increasing adoption of Internet of Things (IoT), surging government initiatives to support smart infrastructure projects, growing adoption of cloud-based in government departments, etc. Yet the market faces some challenges such as complexity of network infrastructure, shortage of quality workforce, dependence of outdated security solutions, lack of compliance, etc.

Key Topics Covered:

1. Executive Summary

2. Introduction

3. Global Market Analysis3.1 Global Cloud Security Market: An Analysis 3.1.1 Global Cloud Security Market by Value3.1.2 Global Cloud Security Market by Service Model (Software-as-a-Service (SaaS), Infrastructure-as-a-Service (IaaS), and Platform-as-a-Service (PaaS) 3.1.3 Global Cloud Security Market by Organization Size (Large Enterprises, and Small and Medium Enterprises (SMEs) 3.1.4 Global Cloud Security Market by Application (BFSI, IT & Telecom, Government, Healthcare, Media & Entertainment, Education, and Others)3.1.5 Global Cloud Security Market by Region (North America, Europe, Asia Pacific, Middle East & Africa, and Latin America)3.2 Global Cloud Security Market: Service Model Analysis 3.2.1 Global Software-as-a-Service (SaaS) Cloud Security Market by Value3.2.2 Global Infrastructure-as-a-Service (IaaS) Cloud Security Market by Value3.2.3 Global Platform-as-a-Service (PaaS) Cloud Security Market by Value3.3 Global Cloud Security Market: Organization Size Analysis 3.3.1 Global Large Enterprises Cloud Security Market by Value3.3.2 Global Small and Medium Enterprises (SMEs) Cloud Security Market by Value3.4 Global Cloud Security Market: Application Analysis 3.4.1 Global Banking, Financial Services, and Insurance (BFSI) Cloud Security Market by Value3.4.2 Global IT & Telecom Cloud Security Market by Value3.4.3 Global Government Cloud Security Market by Value3.4.4 Global Healthcare Cloud Security Market by Value3.4.5 Global Media & Entertainment Cloud Security Market by Value3.4.6 Global Education Cloud Security Market by Value3.4.7 Global Others Cloud Security Market by Value

4. Regional Market Analysis4.1 North America Cloud Security Market: An Analysis 4.1.1 North America Cloud Security Market by Value4.1.2 North America Cloud Security Market by Region (The US and Rest of North America)4.1.3 The US Cloud Security Market by Value4.1.4 The US Cloud Security Market by Application (BFSI, IT & Telecom, Government, Healthcare, Media & Entertainment, Education, and Others)4.1.5 The US Cloud Security Application Market by Value4.1.6 Rest of North America Cloud Security Market by Value4.2 Europe Cloud Security Market: An Analysis 4.2.1 Europe Cloud Security Market by Value4.3 Asia Pacific Cloud Security Market: An Analysis 4.3.1 Asia Pacific Cloud Security Market by Value4.4 Middle East & Africa Cloud Security Market: An Analysis 4.4.1 Middle East & Africa Cloud Security Market by Value 4.5 Latin America Cloud Security Market: An Analysis 4.5.1 Latin America Cloud Security Market by Value

5. Impact of COVID-195.1 Impact of COVID-195.1.1 Impact of COVID-19 on IT Security5.1.2 The Pandemic Necessitates Remote Work Norm, Accelerating Digital Transformation5.1.3 Impact of COVID-19 on Cloud Security5.1.4 Ways COVID-19 is Affecting Cloud Security5.1.5 IT's Response to Challenges/Opportunities Created by COVID

6. Market Dynamics6.1 Growth Driver6.1.1 Growing Prevalence of Cyber Attacks6.1.2 Rising Deployment of Cloud-based Platforms6.1.3 Increasing Adoption of Internet of Things (IoT)6.1.4 Surging Government Initiatives to Support Smart Infrastructure Projects6.1.5 Growing Adoption of Cloud-based in Government Departments6.2 Challenges6.2.1 Complexity of Network Infrastructure6.2.2 Shortage of qualified workforce6.2.3 Dependence on Outdated Security Solutions6.2.4 Lack of Compliance6.3 Market Trends6.3.1 Leveraging Artificial Intelligence (AI) and Machine Learning in Cloud Security6.3.2 Increasing Use of Big Data in Cyber Security6.3.3 Growing Organizations Interest in Secure Access Service Edge (SASE)6.3.4 Introduction of Firewall-as-a-Service (Cloud Firewalls) 6.3.5 Surge in Adoption of Hybrid Security Models6.3.6 Rising Popularity of Remote work

7. Competitive Landscape7.1 Global Cloud Security Players by Market Share7.2 Global Cloud Security Market Players by R&D Expenditure7.3 Global Network Security Players by Market Share

8. Company Profiles8.1 Microsoft Corporation8.1.1 Business Overview8.1.2 Financial Overview8.1.3 Business Strategy8.2 Cisco Systems, Inc.8.2.1 Business Overview8.2.2 Financial Overview8.2.3 Business Strategy8.3 Proofpoint, Inc.8.3.1 Business Overview8.3.2 Financial Overview8.3.3 Business Strategy8.4 McAfee Corp.8.4.1 Business Overview8.4.2 Financial Overview8.4.3 Business Strategy

For more information about this report visit https://www.researchandmarkets.com/r/2wi5q8

Read the rest here:
Insights on the Cloud Security Global Market to 2025 - Featuring Microsoft, Cisco Systems, Proofpoint and McAfee - GlobeNewswire

Read More..

74 Percent of Q1 Malware Undetectable to Signature-Based Tools – Solutions Review

WatchGuard Technologies recently released its Internet Security Report for Q1 2021.

The report covers new threat intelligence on rising network attack rates, new malware attacks, and malware disguises. Among its key findings, WatchGuard discovered that 74 percent of malware were zero-day malware, which cant be detected by signature-based tools; this signifies that enterprises must invest in more advanced detection solutions for their businesses.

ALERT: Our Buyers Guide for SIEM helps you evaluate the best solutions for your business use case and features profiles of the leading profiles, as well as a category overview of the marketplace and a Bottom Line Analysis for each vendor profile.

WatchGuard Technologies offers organizations capabilities in network security, secure Wi-Fi, multi-factor authentication, advanced endpoint protection, and network intelligence. Additionally, it works to provide cybersecurity solutions for businesses of all sizes.

Other key findings from the Internet Security Report for Q1 2021 include discovering a fileless malware variant, XML.JSLoader, exploding in popularity. Also, the report outlined how ransomware loaders can disguise themselves as PDFs with trick file names, and that hackers continue to target IoT devices, especially for botnet attacks. According to the findings, network attacks surged more than 20 percent. Simultaneously, attackers are co-opting legitimate domains for cryptocurrency mining campaigns.

Corey Nachreiner, Chief Security Officer at WatchGuard, made a statement with the release of the report. Last quarter saw the highest level of zero-day malware detections weve ever recorded. Evasive malware rates have actually eclipsed those of traditional threats, which is yet another sign that organizations need to evolve their defenses to stay ahead of increasingly sophisticated threat actors. Traditional anti-malware solutions alone are simply insufficient for todays threat environment. Every organization needs a layered, proactive security strategy that involves machine learning and behavioral analysis to detect and block new and advanced threats.

Learn more about Watchguard Technologies here.

Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.

Follow this link:
74 Percent of Q1 Malware Undetectable to Signature-Based Tools - Solutions Review

Read More..

HSE secures orders to get details of those who downloaded cyber attack information – TheJournal.ie

THE HIGH COURT has ordered that the HSE be provided with details of people who uploaded and downloaded confidential material taken in the recent cyber attack onto a internet securitys firms web-service.

The orders were secured against Chronicle Security Ireland Ltd and its US-based parent Chronicle LLC, in respect of material downloaded onto its malware analysis service VirusTotal. Both companies are owned by Google.

The order was made today by Mr Justice Senan Allen. The judge said he was satisfied from the evidence put before the court to grant the orders sought by the HSE.

The judge noted that was no opposition from the defendants to the making of order, which is known as a Norwich Pharmacal order.

The order requires the defendants to provide information about subscribers who uploaded or downloaded the material onto VirusTotal which is a service designed to screen documents to ensure they are virus-free.

The information includes subscriber details including email addresses, phone numbers, IP addresses or physical addresses.

Through their lawyers Chronicle said they were neither opposing nor objecting to the making of the order sought by the HSE.

Chronicle said while it wanted to assist the HSE as much as they can. For data protection reasons it could not hand over any subscriber details in the absence of a court order.

Seeking the order, Jonathan Newman SC, with Michael Binchy BL for the HSE, submitted that the orders sought could be made.

Such orders counsel said should be made sparingly, but in this instance, there has been a clear breach of the HSEs confidentiality and rights.

Previously the High Court heard that sometime in May approximately 27 files stolen from the HSE were downloaded onto VirusTotal.

The material included sensitive patient information including correspondence, minutes of meetings, and corporate documents, the HSE claims.

That material was downloaded 23 times by VirusTotal subscribers before it was removed by Chronicle on 25 May.

In a sworn statement to the court, the HSEs National Director for Operation Performance and Integration Joe Ryan said it became aware of an article published by the Financial Times last month, which referred to some stolen data, and a link used to access the stolen data online.

#Open journalism No news is bad news Support The Journal

Your contributions will help us continue to deliver the stories that are important to you

The HSE sought the return of the data referred to in the article and an explanation as to the location of the link referred to in the article.

Ryan said the FT indicated it had obtained the stolen data from a confidential source which it refused to reveal.

Following the cyber attack, the HSE obtained a High Court order on 20 May that restraining any sharing, processing, selling or publishing of data stolen from its computer systems.

When the FT received a copy of the order the HSE obtained on 20 May it handed over the information obtained from the source to the HSEs cyber security advisors, Ryan said.

Ryan said that following an analysis of the material received from the FT it was discovered that the stolen documents were uploaded on VirusTotal

After contacting the defendants, Ryan said the stolen material was deleted from the VirusTotal platform.

Comments are closed for legal reasons.

Read more:
HSE secures orders to get details of those who downloaded cyber attack information - TheJournal.ie

Read More..

China is lagging behind on the internet. Amazing Achilles heel – R&R Magazine (www.randrlife.co.uk) Rest and Relax

IISS analysts compiled a country ranking that assesses their digital capabilities. They considered the strength of their digital economies and the health of the cybersecurity sector. In their analysis, it was found that the United States is the country with the highest level of digital power. China, Russia, Great Britain, Australia, Canada, France and Israel came second. The third level includes: India, Indonesia, Japan, Malaysia, North Korea, Iran and Vietnam.

Read also: The United States spends billions on new technologies. China is protesting

Why is China only ranked second in digital power? Experts from the International Institute for Strategic Studies believe that the media has focused too much on Chinas success in building a digital economy in recent years and on cyber attacks by Chinese hackers. However, they have not paid enough attention to the weaknesses of Chinas infrastructure. According to IISS, China mainly focuses on monitoring content on the Internet and neglects Internet security itself. Chinese digital intelligence analysis is less mature than the so-called Five Eyes Alliance (USA, Great Britain, Canada, Australia and New Zealand), because it is based on ideology and increasingly linked to the goals of Communist Party leaders says Greg Austin, an expert at the International Institute for Studies The strategy.

Read also: China wants a new Internet. The West is full of fear

IISS analysts estimate that, at least until 2030, the United States will remain the dominant power on the Internet, and China will not be able to bridge the digital capabilities gap by then. They also noted that smaller economies such as Israel and Australia have been able to build their strength in cyberspace in recent years, while countries such as Japan have neglected the issue.

Continued here:
China is lagging behind on the internet. Amazing Achilles heel - R&R Magazine (www.randrlife.co.uk) Rest and Relax

Read More..

Keynotes Announced for IEEE International Conference on Quantum Computing and Engineering – HPCwire

LOS ALAMITOS, Calif., June 24, 2021 The IEEE International Conference on Quantum Computing and Engineering (QCE21), a multidisciplinary event bridging the gap between the science of quantum computing and the development of an industry surrounding it, reveals its full keynote lineup. Taking place 18-22 October 2021 virtually, QCE21 will deliver a series of world-class keynote presentations, as well as workforce-building tutorials, community-building workshops, technical paper presentations, stimulating panels, and innovative posters. Register here.

Also known as IEEE Quantum Week, QCE21 is unique by integrating dimensions from academic and business conferences and will reveal cutting edge research and developments featuring quantum research, practice, applications, education, and training.

QCE21s Keynote Speakers include the following quantum groundbreakers and leaders:

Alan Baratz D-Wave Systems, President & CEOJames S. Clarke Intel Labs, Director of Quantum HardwareDavid J. Dean Oak Ridge National Laboratory, Director Quantum Science CenterJay Gambetta IBM Quantum, IBM Fellow & VP Quantum ComputingSonika Johri IonQ, Senior Quantum Applications Research ScientistAnthony Megrant Google Quantum AI, Lead Research ScientistPrineha Narang Harvard University & Aliro Quantum, Professor & CTOBrian Neyenhuis Honeywell Quantum Solutions, Commercial Operations LeaderUrbasi Sinha Raman Research Institute, Bangalore, ProfessorKrista Svore Microsoft, General Manager Quantum Systems

Through participation from the international quantum community, QCE21 has developed an extensive conference program with world-class keynote speakers, technical paper presentations, innovative posters, exciting exhibits, technical briefings, workforce-building tutorials, community-building workshops, stimulating panels, and Birds-of-Feather sessions.

Papers accepted by QCE21 will be submitted to the IEEE Xplore Digital Library, and the best papers will be invited to the journals IEEE Transactions on Quantum Engineering (TQE) and ACM Transactions on Quantum Computing (TQC).

QCE21 is co-sponsored by IEEE Computer Society, IEEE Communications Society, IEEE Council of Superconductivity, IEEE Future Directions Committee, IEEE Photonics Society, IEEE Technology and Engineering Management Society, IEEE Electronics Packaging Society, IEEE Signal Processing Society (SP), and IEEE Electron Device Society (EDS).

The inaugural 2020 IEEE Quantum Week built a solid foundation and was highly successful over 800 people from 45 countries and 225 companies attended the premier event that delivered 270+ hours of programming on quantum computing and engineering.

The second annual 2021 Quantum Week will virtually connect a wide range of leading quantum professionals, researchers, educators, entrepreneurs, champions, and enthusiasts to exchange and share their experiences, challenges, research results, innovations, applications, and enthusiasm, on all aspects of quantum computing, engineering and technologies. The IEEE Quantum Week schedule will take place during Mountain Daylight Time (MDT).

Visit IEEE QCE21 for all event news including sponsorship and exhibitor opportunities.

QCE21 Registration Package provides Virtual Access to IEEE Quantum Week Oct 18-22, 2021 as well as On-Demand Access to all recorded events until the end of December 2021 featuring over 270 hours of programming in the realm of quantum computing and engineering.

About the IEEE Computer Society

TheIEEE Computer Societyis the worlds home for computer science, engineering, and technology. A global leader in providing access to computer science research, analysis, and information, the IEEE Computer Society offers a comprehensive array of unmatched products, services, and opportunities for individuals at all stages of their professional career. Known as the premier organization that empowers the people who drive technology, the IEEE Computer Society offers international conferences, peer-reviewed publications, a unique digital library, and training programs.

Source: IEEE

The rest is here:
Keynotes Announced for IEEE International Conference on Quantum Computing and Engineering - HPCwire

Read More..

Crdit Agricole CIB partners with Pasqal and Multiverse Computing – IBS Intelligence

Crdit Agricole CIB with European tech Pasqal and Multiverse Computing announced a partnership to design and implement new approaches running on classical and quantum computers to outperform state of the art algorithms for capital markets and risk management.

International companies and institutions have started investing heavily in quantum technologies. Europe launched the Quantum Flagship Plan in October 2018, and France recently announced a 1.8 billion investment plan.

Quantum computing is likely to profoundly impact multiple industries in the coming years, including finance. Finance has been making substantial use of algorithms requiring advanced mathematics and statistics so far; it is the turn of quantum physics to help solve quantitative financial problems. In addition, quantum theory and technology, assembled in Quantum Computing, start demonstrating promising applications in capital markets and risk management.

Crdit Agricole CIB has teamed up with two quantum technology companies to apply quantum computing to real-world finance applications. French company Pasqal is developing a quantum computer based on neutral atoms arrays, currently being trialled to build industrial quantum computers. Spanish company Multiverse Computing specialises in quantum algorithms which can run both on quantum and classical computers.

Georges-Olivier Reymond, CEO of Pasqal, said: I strongly believe in that partnership to foster the usage of quantum computing for Finance. To our knowledge, it is the first-ever in which all the stakeholders, software developer, hardware provider and end-user are working together on a problem. All the teams are very excited, and this development will be the cornerstone of future industrial applications for neutral atom quantum computers.

Enrique Lizaso, CEO of Multiverse Computing, said: We are thrilled with the opportunity of working together with Credit Agricole CIB and Pasqal in this ambitious project, that will put into production the most advanced tools currently only used in large non-financial institutions in US and China. This is a landmark project in Finance in the world.

LinkedInWhatsAppFacebook Twitter EmailPrint

Read the original:
Crdit Agricole CIB partners with Pasqal and Multiverse Computing - IBS Intelligence

Read More..

The evolution of cryptographic algorithms – Ericsson

Cryptographic algorithms and security protocols are among the main building blocks for constructing secure communication solutions in the cyber world. They correspond to the locks that secure a house in the physical world. In both, it is very difficult to access the assets inside without a valid key. The algorithms and protocols are based on hard mathematical and computationally infeasible problems, whereas the lock mechanisms are based on the difficulty of solving the physical construction.

Mobile networks are critical infrastructure and heavily use advances in cryptographic algorithms and protocols to ensure the security of the information in the communication and privacy protection for the individuals. In this blog post, we take a detailed look at the cryptographic algorithms and protocols used in mobile communications and share some insights into the recent progress. We give an overview taking into consideration the development from 2G to 5G and beyond. In addition, we present detailed information on the progress toward defining the profiles to be used in the security protocols for the mobile communication systems. Last but not least, we give the current status and future plans for post-quantum cryptographic algorithms and protocols.

It can be hard to get an overview of the cryptographic algorithms used in mobile networks. The specifications are spread out over many documents, published over a period of 30 years by the three standardization organizations: 3GPP, ETSI and GSMA. The algorithms can also have quite cryptic names, with more than one name often given to the same algorithm. For example, GEA5, UEA2, 128-EEA1 and 128-NEA1 are almost identical specifications of SNOW 3G for GPRS, UMTS, LTE and NR respectively.

The 3GPP/GSMA algorithms come in three different types: authentication and key generation, encryption and integrity. The authentication and key generation algorithms are used in the Authentication and Key Agreement (AKA) protocol. The encryption and integrity algorithms are used together or independently to protect control plane and user plane data. An overview of all currently specified algorithms is shown in Figures 1 and 2.

The second generation (2G or GSM) mobile networks have quite low security by todays standards. But GSM was actually the first mass-market communication system to use cryptography, which was both revolutionary and controversial. At the time, export of cryptography was heavily restricted and GSM had to be designed with this in mind. The encryption algorithms A5/1 and A5/2 are LFSR-based stream ciphers supporting 64-bit key length. A5/2 is a so-called export cipher designed to offer only 40-bit security level. Usage of export ciphers providing weak security was common at that time and other standards like TLS also supported export cipher suites.

To further align with export control regulations, the key generation algorithms COMP128-1 and COMP128-2 decreased the effective output key length to 54 bits by setting 10 bits the key to zero. While A5/1 and A5/2 mostly met their design criteria, COMP128-1 was a very weak algorithm and was soon replaced by COMP-128-2 and COMP128-3. When packet-switched data was introduced with GPRS, slightly different algorithms GEA1 and GEA2 were introduced. Similar to A5/1 and A5/2, GEA1 and GEA2 are LFSR-based stream ciphers supporting 64-bit key length, where GEA1 was the export cipher. The export ciphers A5/2 and GEA1 are forbidden to support in phones since many years and COMP128-1 is forbidden to support in both networks and SIM cards. None of the original 2G algorithms were officially published anywhere as they were intended to be kept secret, which was quite common practice at the time. But all were reverse engineered by researchers in academia nearly a decade after their development.

The third generation (3G or UMTS) mobile networks introduced 128-bit security level public encryption and integrity algorithms. In 3G, the algorithms were selected by the ETSI Security Algorithms Group of Experts (SAGE), which has since made recommendations for all the new algorithms for mobile networks. The final decision is always taken by 3GPP SA WG3, the security working group in 3GPP. While many other designs from the same time, such as SSH and TLS, turned out to have significant flaws, the 3G algorithms and their modes of operation are still secure today.

The 3G encryption algorithms UEA1 and UEA2 use the KASUMI block cipher and the SNOW 3G stream cipher, which are slightly modified versions of the MIST block cipher and SNOW 2.0 stream cipher respectively. The integrity algorithm UIA1 is CBC-MAC using KASUMI and UEA2 is a Carter-Wegman MAC based on SNOW 3G. For authentication and key generation, the exact algorithm is not standardized and it is up to the operator to choose the algorithm deployed in their home network and SIM cards. 3GPP defines the Milenage algorithm (based on AES-128) as a well-designed example algorithm and this choice is widely used in practice. All the 3G algorithms have also been specified to be used in 2G.

Figure 1: 3GPP/GSMA algorithms for authentication and key generation - Green algorithms are secure while red algorithms only offer 64-bit security or less.

Figure 2: 3GPP/GSMA algorithms for encryption and integrity protection - Green algorithms are secure while red algorithms only offer 64-bit security or less.

The fourth generation (4G or LTE) mobile networks replaced KASUMI with AES-128. The encryption algorithm 128-EEA2 is AES in counter mode (AES-CTR) while the integrity algorithm 128-EIA2 is AES in CMAC mode. 4G also introduced Tuak, a new algorithm family for authentication and key generation based on Keccak hash algorithm but using slightly different parameters from the one which NIST later standardized as SHA-3. SIM cards are recommended to support both Milenage and Tuak. 4G also introduced an optional algorithm, ZUC, to construct 128-EEA3 and 128-EIA3 algorithms, which are the only optional ones to be supported in implementations. It is also worth mentioning that 3GPP specifies at least two mandatory algorithms due to the security practice of having a backup algorithm.

The fifth generation (5G or NR) uses exactly the same algorithms used in 4G. There are no weaknesses in any of the 4G algorithms and they offer good enough performance when implemented in hardware. However, the currently used algorithms are not suitable for future deployments as they are slow in software, does not support 256-bit keys, and only support 32-bit MACs. Software performance is essential for software implementations in virtualized deployments. While these algorithms are fast enough for 5G when implemented in hardware, they perform far worse than state-of-the art algorithms also in hardware and will likely not be suitable for 6G.

3GPP SA3 and ETSI SAGE have therefore started working together on new virtualization-friendly algorithms suitable for later 5G releases and 6G. It is essential that the new algorithms perform well in software on a wide range of architectures (such as x86, ARM and RISC-V) and that they can also be efficiently implemented in hardware. AES-CTR is already fulfilling these criteria, but would have to be accompanied by a high-performance integrity mode like GMAC. SNOW 3G is not up to the task, but the new cipher SNOW-V would be a perfect fit, outperforming even AES-GCM on x86 processors.

The new algorithms to be introduced to 3GPP will likely support only 256-bit key length and offer at least 64-bit tags. While 128-bit algorithms will be practically secure against quantum computers, cellular networks are increasingly classified as critical infrastructure. Already today, governments and financial institutions often mandate more than 128-bit security level for protection of their communication.

While mobile networks use some algorithms and security protocols specific to 3GPP, most of the security protocols used in 5G such as TLS, DTLS, IKEv2, ESP, SRTP, X.509, and JOSE are standardized or maintained by the Internet Engineering Task Force (IETF). 3GPP has, for many years, had the excellent tradition of updating their security profiles in almost every release following recommendations from academia, IETF and other organizations. A large part of this work has been driven by Ericsson.

The general 3GPP profiles for (D)TLS, IPsec and X.509 specified in TS 33.210 and TS 33.310 apply to many different 3GPP interfaces. 3GPP now has some of the best and most secure profiles for TLS and IPsec. 3GPP was, for example, very early with mandating support for TLS 1.3 and with forbidding TLS 1.1 and all weak cipher suites in TLS 1.2. Best practice today is to encrypt as much information as possible and to do key exchange with Diffie-Hellman to enable Perfect Forward Secrecy (PFS). The profiles are well ahead of most other industries as well as IETFs own profiles. 5G is increasingly referred to as critical infrastructure and as such the security profiling should be state-of-art.

For Rel-16 and Rel-17, 3GPP initiated work items specific to security updates, but similar work has been done for much longer under the general TEI work item. For Rel-17, 3GPP aims to mandate support for SHA-256 in the few remaining places where MD5 or SHA-1 is still in use, introduce Curve25519 for low latency key exchange in IKEv2, enable use of OCSP and OCSP stapling as an alternative to CRL everywhere, mandate support of DTLS-STRP and AES-GCM for SRTP, and introduce deterministic ECDSA.

Updating profiles for cryptographic algorithms and security protocols is a process that takes many years because of backward compatibility, as nodes from one release often have to talk to devices from much older releases. Before any weak algorithms or protocol versions are forbidden, the support of strong alternatives needs to have been mandatory for several releases.

Taking into consideration that 3GPP produces approximately one release every 1.5 years, it is essential to mandate the support of new versions of security protocols as soon as possible like 3GPP did with TLS 1.3. Some drawbacks of TLS 1.2 are that it requires a large amount of configuration to become secure and does not provide identity protection, therefore it should be phased out in the future.

Current best practice is to mandate the support of at least two strong algorithms everywhere, so there is always a strong algorithm supported if one of the algorithms is broken. The National Institute of Standards and Technology (NIST) has long functioned as a global standardization organization for cryptographic algorithms. NIST standardizes algorithms in open competitions, inviting contributions from academia all over the world. Both AES and SHA-3 were designed by researchers from Europe. Recently, the Internet Research Task Force Crypto Forum Research Group (IRTF CFRG) has complemented NIST as a global cryptographic Standards Developing Organization (or SDO) and has standardized algorithms like ChaCha20-Poly1305, Curve25519, EdDSA, LMS, and XMSS. NIST has introduced many of the CFRG algorithms within their own standards.

Broken algorithms were once very common, but essentially all algorithms standardized by NIST, IRTF CFRG and ETSI SAGE since 2000 (such as AES, SHA-2, SHA-3, ChaCha20, KASUMI and SNOW 3G) have remained secure, with no practical attacks. Figure 3 gives an overview of broken, weak or legacy algorithms and security protocols. 3GPP has already forbidden most of these and will likely phase out the rest in future releases.

Figure 3: Broken and legacy cryptographic algorithms and security protocols

A big part of future work in upcoming releases will be to introduce quantum-safe algorithms or Post-Quantum Cryptography (PQC). PQC algorithms are cryptographical algorithms that are secure against attacks from quantum computers, which happens to be most algorithms except RSA and Elliptic-Curve Cryptography (ECC). This is something 3GPP is well prepared for, having already future-proofed protocols like 5G Subscription Concealed Identifier (SUCI) by allowing ciphertexts and public keys to be several thousands of bytes long. If somebody builds a sufficiently large quantum computer, RSA and ECC will likely be broken in a matter of hours.

Small quantum computers already exist, however it is still uncertain when (or if) quantum computers capable of breaking these cryptographic algorithms will be built. 3GPP will likely introduce quantum-safe algorithms long before quantum computers even get close to affecting the security of 3GPP systems. Introducing non-standardized cryptographic algorithms likely introduces more risks than it solves, and both 3GPP and IETF have taken the decision to wait for NIST standardization of PQC algorithms, which is already in the final round and will be ready in 2022-2024. After that, IETF will standardize the use of PQC algorithms in (D)TLS, IKEv2, X.509, JOSE and HPKE and as soon as this is done, 3GPP will introduce the new updated IETF RFCs.

Some of the candidates for post-quantum security level 1 in the final round of NIST PQC standardization are summarized in Figure 4. It seems very likely that one of the lattice-based algorithms will be the main replacement for RSA and ECC, for both Key Encapsulation Mechanisms (KEM) and signatures. KEM provides a simplified interface for key exchange and public key encryption. Lattice-based algorithms have slightly larger public keys, signature and ciphertext sizes than the ones of RSA, but they are even faster than ECC. As can be seen from Figure 4, PQC is very practically useful for most applications. Transition to PQC can be seen as a bigger step than the transitions from 3DES to AES and SHA-1 to SHA-256, as it might require security protocol changes to a larger degree. Note that PQC algorithms are not relying on quantum mechanics and software implementation does not require any new hardware.

Figure 4: Some candidates (post-quantum security level 1) in the third and final round of NIST PQC Standardization. The performance measurements are single-core on Skylake 2.5 GHz https://bench.cr.yp.to/ebats.html (lower is better)

128-bit symmetric algorithms will not be practically affected by quantum computers and NIST is currently labeling AES-128 as post-quantum security level 1. Even so, 3GPP is moving towards increased use of 256-bit keys and algorithms such as AES-256.

More information about the algorithms used in mobile networks can be found in the specification series prepared by the 3GPP SA3 working group. For the main profiles used in the security protocols, check 3GPP TS 33.210 and TS 33.310.

To learn and keep up to date on the latest progress in post-quantum cryptography, follow NIST PQC Standardization.

Learn more about the realities of post-quantum cryptography in our previous blog post from 2020.

Discover how 5G fits into mobile communication network security in our guide to 5G network security

Read our summary of the latest standardization work from 3GPP, Release 16 (5G phase 2)

See the original post:
The evolution of cryptographic algorithms - Ericsson

Read More..

EU rewrites rulebook on science and technology cooperation with the rest of the world – Science Business

After years of fighting against a Europe first approach in research funding, policy makers and lobbyists in Brussels now want to explicitly limit access for scientists in countries that flout academic freedom and intellectual property rights.

The Commission says in future it will base its rules for international scientific cooperation on the principle of open strategic autonomy. In particular, it is drawing up a roadmap on science and technology with China, in which it is seeking to impose stricter terms on cooperation, to ensure EU research organisations and companies can access the Chinese market safely, without needing to worry about potential IP breaches.

We are not in the autonomy trap, we are keeping our eyes open, Jean-Eric Paquet, director general for research and innovation told the EUs Research & Innovation Days conference last week.

Paquet said both he and EU research commissioner Mariya Gabriel want intense cooperation with China, whose scientific prowess is spectacular in many respects. But before opening its arms, the Commission is planning to scrutinise Chinas practices in intellectual property and academic freedom. We need indeed to do it on a proper basis, and that is the challenge ahead of us in the coming weeks and months, said Paquet.

Researchers remain largely in favour of international R&D cooperation, but they do want limitations to be applied to countries that could use open access to EU programmes to spy on sensitive technologies for economic and military gains.

We are fully in favour of international cooperation, and we say no to a blind EU first approach, said Kurt Deketelaere, secretary general of the League of European Research Universities. But he said, the EU should protect itself from unfair and abusive practices by China.

Universities want help in steering a path through the new requirements and say the Commission should list the technologies it wants to protect, and specify the criteria for international cooperation universities should apply when weighing up collaboration projects with the rest of the world.

Heads of Canadian, American and UK universities are spending time with people from the national security services to track potential security threats via science collaboration, according to Deketelaere.

It would be very useful if the Commission took the initiative to open up channels for similar discussions between the EUs 27 national security services, said Deketelaere. We have to take this seriously, he said.

Germany has unilaterally put in place measures to make scientists and universities aware of the challenges posed by international cooperation, said Susanne Burger, head European and international cooperation at Germanys federal ministry for education and research. When dealing with one of the systemic rivals [universities] can approach us, she said.

Our aim is not to control the freedom of science, or to interfere in any case, said Burger. What we do is to just help [universities] discover the traps in international cooperation.

As a sign of a tougher stance, last week German authorities arrested a scientist who had been passing sensitive information from a German university to Russian intelligence services.

Research spies

German MEP Reinhard Btikofer said China has been exploiting its relationship with the EU. I think it's not a trust-building measure if they send scientists and don't say that these scientists are working on behalf of the Chinese armed forces, and that they are here to spy on our technology in order to enhance China's civil military fusion programme, and to help them in building an even stronger military at the service of their aggressive foreign policy, he said.

Btikofer was recently banned from entering China. In March, the EU announced sanctions against officials of the Chinese Communist Party who are thought to be involved in human rights abuses in the Xinjiang province. In retaliation, Beijing imposed sanctions on seven EU politicians, Btikofer included.

As a long-time critic of the Chinese government, Btikofer is calling for the EU to ensure science cooperation is based on commonly agreed principles and rules. You cannot build the relationship with a systemic rival on the basis of blind trust, he said.

Autonomy trap

It is ironic to think how as recently as 2018, EU research lobbies and policy makers in Brussels were quick to dismiss a proposal by Romanian MEP Dan Nica to make the Horizon Europe programme exclusive for EU researchers.

The Commissions pivot to open strategic autonomy is a significant departure from the position of the previous EU research commissioner Carlos Moedas, a leading proponent of science diplomacy. As the 2021 - 2027 Horizon Europe programme was taking shape, Moedas frequently called for EU research and innovation to be, open to the world.

Despite believing there should be some restraints, Deketelaere warned the EU should take care not isolate itself from the international scientific community. Organisations that feel weak, or are becoming weaker, very often tend to ask for more autonomy, he said. And with asking for more autonomy, they often isolate themselves more than they already were, and then they become even weaker as a consequence. And at the end of the day, of course, they collapse, said Deketelaere.

As one example of how these things can be finessed, the Commission and member states recently came to an agreement on third country access to sensitive research projects in quantum science and space that are funded through Horizon Europe.

The terms on which they take part will be negotiated separately with each associated country, the Commission agreed, after caving in to pressure from member states. Before that, the Commission planned to introduce a blanket ban on non-EU researchers and companies in all quantum and space projects.

Quantum is the future of computation, is the future communication, is really the next breakthrough in terms of technology, said Roberto Viola, the Commissions director general for communications technology. I think there's no doubt that we want a quantum computer available for our scientists and for our companies.

The EU is trying to boost its industrial competitiveness in key emerging technologies and make sure it has the capabilities needed to immunise itself against shortages of microelectronics and medical devices.

A global shortage of microchips, paired with significant delays in international shipping, has forced EU manufacturers of cars and medical devices to reduce or suspend production. This is really impairing the capability of Europe to produce, said Viola.

Viola said it is in Europes interest to build open strategic autonomy so that such situations can be avoided in the future. Theres not one way to deliver autonomy. It's a combination of being stronger technologically speaking in Europe, and also being smarter when it comes to partnerships, he said.

Europe should be able to build its own technologies and pay more attention at the rules of engagement with the rest of the world. We want those technologies to be used for peaceful use and no country, no company outside Europe should use these technologies against us, said Viola.

The EU recently announced it will establish closer research ties with the US and Canada, two countries which have already put in place new rules of engagement with China, for fear of technology and science espionage.

It is, I think, an obvious fact that we have to make a distinction, whether we are dealing with likeminded partners, or whether partners do not necessarily share our values on the principles of transparency, or reciprocity, or other core concerns, said Btikofer.

View post:
EU rewrites rulebook on science and technology cooperation with the rest of the world - Science Business

Read More..

The war on Jordan Peterson – Washington Times

ANALYSIS/OPINION:

Leftist hatred for the Canadian psychology professor Jordan Peterson is really something to behold. He stands as an example of what happens to someone who strays from the crazy line of thinking by modern campus bigots.

Mr. Peterson is the canary in the toxic coal mine of political correctness and petty thought police.

Lets start with the professors crime.

Simply put, Mr. Peterson does not share the monolithic, prevailing liberal orthodoxy on university campuses dictating that Western White males are the worlds evil oppressors and anyone who does not belong to that evil race is a victim trapped in circumstances beyond his or her control.

Consider for a moment the leftist premise to which the radical Mr. Peterson objects.

On its face, it is blatantly racist. Divvying up, defining and punishing groups of people based on their race (or gender) was racist 200 years ago during slavery times. It was racist 75 years ago. It is still racist today.

Yet, astonishingly, this reborn racism is widely embraced by the racists who dominate college campuses today.

The second obvious flaw in this racist orthodoxy is the message it sends to non-White, non-males.

Any challenges, failures or misery you face in life are not your fault. And, even worse, there is nothing you can do to change your circumstances. So, just stew in your bitterness and hatred for White males along with the rest of us, goes the leftist campus orthodoxy of the day.

Is there any more destructive and devious lie that could be sold to young people? Is there anything more dystopian or hopeless?

Mr. Peterson has become something of a rock star among beleaguered youth suffocating in the coal mine of modern academia with speeches, lectures, podcasts and a book titled, The Twelve Rules of Life: An Antidote to Chaos. His message has been particularly devoured among young men many of them White who have been vilified and emasculated by crazy university teachings.

Find meaning in life. Take responsibility for yourself. Surround yourself with good people who want the best for you.

Pretty nasty stuff, huh?

The chapter titles of his book include radical instructions such as: Stand up straight with your shoulders back, Tell the truth or, at least, dont lie, and Pet a cat when you encounter one on the street.

These lessons have earned Mr. Peterson a level of blinding hatred that is normally reserved for former President Donald Trump.

So it has been with considerable glee that the leftist media the Revolutionary Guard of modern academia hunted down Mr. Peterson as he suffered from a pestilence of personal maladies that no decent human would wish on his worst enemy.

Over the past year, Mr. Peterson has suffered physical illness and serious mental disease including suicidal thoughts. His wife was diagnosed with cancer. As his life spiraled out of control, Mr. Peterson developed a near-fatal drug addiction.

Actual humans read those lines and are struck with pangs of angst and sorrow for Mr. Peterson and his family. They mutter a prayer for them.

But not the campus bigots and the jackals in the media. Every bleak detail is catnip to them. Their desperate war to destroy all who disagree never sleeps.

When the story of Mr. Petersons troubles emerged about a year ago, a creature named Amir Attaran, a professor of both law and medicine, began his public hot take on Mr. Petersons travails: #KARMA.

Jordan Peterson, oracle to gullible young men, preacher of macho toughness, and hectoring bully to snowflakes, is addicted to strong drugs and his brain is riddled with neurological damage. He deserves as much sympathy as he showed others.

Says the law professor.

A new interview with the Sunday Times of London about his tribulations sparked yet another avalanche of glee and gloating over the unimaginable pain Mr. Peterson has been through.

Introducing her interview, reporter Decca Aitkenhead opines openly referring to herself no fewer than three times in the lead paragraph that she is unable to diagnose the root of Mr. Petersons problems.

I dont know if this is a story about drug dependency, or doctors, or Peterson family dynamics or a parable about toxic masculinity, she sneers.

If these are the purveyors of social justice, we are truly doomed.

Charles Hurt is opinion editor of The Washington Times. He can be reached at churt@washingtontimes.com.

Read more:
The war on Jordan Peterson - Washington Times

Read More..

Review: Beyond Order, by Jordan B. Peterson – The Atlantic

This article was published online on March 2, 2021.

One day in early 2020, Jordan B. Peterson rose from the dead. The Canadian academic, then 57, had been placed in a nine-day coma by doctors in a Russian clinic, after becoming addicted to benzodiazepines, a class of drug that includes Xanax and Valium. The coma kept him unconscious as his body went through the terrible effects of withdrawal; he awoke strapped to the bed, having tried to rip out the catheters in his arms and leave the intensive-care unit.

When the story of his detox became public, in February 2020, it provided an answer to a mystery: Whatever happened to Jordan Peterson? In the three years before he disappeared from view in the summer of 2019, this formerly obscure psychology professors name had been a constant presence in op-ed columns, internet forums, and culture-war arguments. His book 12 Rules for Life: An Antidote to Chaos, published in 2018, sold millions of copies, and he had conducted a 160-city speaking tour, drawing crowds of up to 3,000 a night; premium tickets included the chance to be photographed with him. For $90, his website offered an online course to better understand your unique personality. An official merchandise store sold Peterson paraphernalia: mugs, stickers, posters, phone cases, tote bags. He had created an entirely new model of the public intellectual, halfway between Marcus Aurelius and Martha Stewart.

The price of these rewards was living in a maelstrom of other peoples opinions. Peterson was, depending on whom you believed, either a stern but kindly shepherd to a generation of lost young men, or a reactionary loudmouth whose ideas fueled the alt-right and a backlash to feminism. He was revered as a guru, condemned as a dangerous charlatan, adored and reviled by millions. Peterson has now returned to the public sphere, and the psyche-splitting ordeal of modern celebrity, with a new book, Beyond Order: 12 More Rules for Lifean intriguing title, in light of his recent experiences. The mystery deepens: What really happened to Jordan Peterson, and why has he come back for more?

Growing up in Fairview, Alberta, Peterson was small for his age, which fostered both a quick wit and a fascination with the power and violence of traditional masculinity. He once recounted in a Facebook post how hed overheard a neighbor named Tammy Roberts joking with another girl that she wanted to keep her surname, so she would have to marry some wimp. Then she turned around and proposed to the teenage Jordan. He spent a youthful summer working on a railroad in Saskatchewan, with an all-male group that nicknamed him Howdy Doody, after the freckle-faced puppet. As a student, he visited a maximum-security prison, where he was particularly struck by a convict with a vicious scar right down his chest, which he surmised might have come from surgery or an ax wound: The injury would have killed a lesser man, anywaysomeone like me.

How to be a greater man was very much on Petersons mind. Raised in a mildly Christian household, he decided as a teenager that religion was for the ignorant, weak and superstitious. He yearned for a left-wing revolution, an urge that lasted until he met some left-wing activists in college. Then, rejecting all ideology, he decided that the threat of the Cold War made it vital to understand the human impulse toward destruction. He began to study psychology.

Alongside pursuing his doctorate, teaching at Harvard and then the University of Toronto, and raising a familyhe married Tammy in 1989, and yes, she took his surnamePeterson started work on his first book, a survey of the origins of belief. Its ambition was nothing less than to explain, well, everythingin essence, how the story of humanity has been shaped by humanitys love of stories. Maps of Meaning, published in 1999, built on the work of academics like Joseph Campbell, the literature and religion scholar who argued that all mythic narratives are variations of a single archetypal quest. (Campbells monomyth inspired the arc of Star Wars.) On this heros journey, a young man sets out from his humdrum life, confronts monsters, resists temptation, stares into the abyss, and claims a great victory. Returning home with what Campbell calls the power to bestow boons on his fellow men, the hero can also claim the freedom to live at peace with himself.

In the fall of 2016, Peterson seized the chance to embark on his own quest. A Canadian Parliament bill called C-16 proposed adding gender identity or expression to the list of protected characteristics in the countrys Human Rights Act, alongside sex, race, religion, and so on. For Peterson, the bill was proof that the cultural left had captured public-policy making and was imposing its fashionable diktats by law. In a YouTube video titled Professor Against Political Correctness, he claimed that he could be brought before a government tribunal if he refused to use recently coined pronouns such as zhe. In the first of several appearances on Joe Rogans blockbuster podcast, he made clear that he was prepared to become a martyr for his principles, if necessary. His intensity won over Rogana former mixed-martial-arts commentator with a huge young male fan base and eclectic political views (a frequent critic of the left, he endorsed Bernie Sanders in 2020). You are one of the very few academics, Rogan told Peterson, who have fought against some of these ideas that are not just being promoted but are being enforced.

The fight over C-16, which became law in 2017, was a paradigmatic culture-war battle. Each side overstated the other sides argument to bolster its own: Either you hated transgender people, or you hated free speech. In Petersons view, the bill exposed the larger agenda of postmodernism, which he portrayed as an ideology that, in denying the existence of objective truth, leaves its practitioners without an ethic. (This is not how theorists of postmodernism define it, and if you have a few hours to spare, do ask one of them to explain.) He was on the side of science and rationality, he proclaimed, and against identity politics. Feminists were wrong to argue that traditional gender roles were limiting and outdated, because centuries of evolution had turned men into strong, able providers and women into warm, emotionally sensitive nurturers. The people who hold that our culture is an oppressive patriarchy, they dont want to admit that the current hierarchy might be predicated on competence is how he later phrased it. (This was during Donald Trumps presidency.) The founding stories of the worlds great religions backed him up, as did the heros journey: It is men who fight monsters, while women are temptresses or helpmates.

The mainstream media began to pay attention. Peterson had posted some advice on the Q&A site Quora, which he turned into his second book, 12 Rules for Life, a mashup of folksy wisdom, evolutionary biology, and digressions on the evils of Soviet Communism. (His daughter, Mikhaila, is named after Mikhail Gorbachev.) It stresses the conservative principles of self-reliance and responsibility, encouraging readers to tidy their bedrooms and smarten themselves up to compete for female attentiona message reinforced by a questionable analogy involving lobsters, which fight by squirting urine from their faces to establish their place in the mating hierarchy. Parents, universities and the elders of society have utterly failed to give many young men realistic and demanding practical wisdom on how to live, David Brooks wrote in a New York Times column. Peterson has filled the gap. He offered self-help for a demographic that wouldnt dream of reading Goop.

Yet the relentless demands of modern celebritymore content, more access, more authenticitywere already tearing the psychologists public persona in two. One Peterson was the father figure beloved by the normie readers of 12 Rules, who stood in long lines to hear him speak and left touching messages on internet forums, testifying that he had turned their lives around. The other Peterson was a fearsome debater, the gladiator who crowed Gotcha! at the British television interviewer Cathy Newman after a series of testy exchanges about the gender pay gap and the freedom to give offense. His debates were clipped and remixed, then posted on YouTube with titles announcing that he had DESTROYED his interlocutors.

I know this because one of them was me: Our interview for British GQ, which has garnered more than 23 million views, is easily the most viral moment Ive ever had. While dozens of acquaintances emailed and texted me to praise my performance and compare Petersons stern affect to Hannibal Lecter with a Ph.D., mean comments piled up like a snowdrift below the video itself. I was biased and utterly intellectually bankrupt, dishonest and malicious, and like a petulant child who walked into an adult conversation. What kind of man, several wondered, would marry a dumb, whiny, shrill feminist like this? (Quite a nice one, thanks for asking.)

Peterson lived in this split-screen reality all the time. Even as he basked in adoration, a thousand internet piranhas ripped through his every utterance, looking for evidence against him. One week, Bari Weiss anointed him a leading culture warrior, including him in a New York Times feature as a member of the Intellectual Dark Web. Ten days later, the newspaper published a mocking profile of him, reporting that his house was decorated with Soviet propaganda and quoting him speculating about the benefits of enforced monogamy in controlling young mens animal instincts. After he was accused of pining after Margaret Atwoods Gilead, he quickly posted a note on his website arguing that he meant only the social enforcement of monogamy.

The negative publicity affected him deeply, and it was endless. After the Indian essayist Pankaj Mishra charged him with peddling fascist mysticism, Peterson tweeted that Mishra was an arrogant, racist son of a bitch and a sanctimonious prick. He added: If you were in my room at the moment, Id slap you happily. Even sleep brought no relief. Peterson is a believer in dream analysis, and after one particularly ill-tempered interview in October 2018, he blogged about a nightmare that followed. In his dream, he met a man who simply would not shut up. The man reminded him, he wrote, of an acquaintance at university in Canada he calls Sam, who drove around in a Mercedes with swastikas on the doors, saying the worst things he could, unable to resist inviting attacks. I cant help myself, Sam had told Peterson. I have a target drawn on my back. Eventually, at a party, Sam overstepped the line; he was about to be assaulted by a mob until another acquaintance felled him with a single punch. Peterson never saw Sam again. In his dream, the Sam-like man talked and talked and finally pushed me beyond my limit of tolerance I bent his wrists to force his knuckles into his mouth. His arms bent like rubber and, even though I managed the task, he did not stop babbling. I woke up.

It is hard to resist reading the subtext like this: Peterson had spent months being casually described as a Nazi and associated with the alt-right, labels he always rejected. He had metaphorical swastikas on his car door. He couldnt resist putting a target on his own back, and he, too, couldnt stop talking. Indeed, in May 2019, after railing against left-wing censoriousnessnow widely called cancel culturehe met with Viktor Orbn, the proudly illiberal prime minister of Hungary, whose government has closed gender-studies programs, waged a campaign to evict Central European University from the country, and harassed independent journalists. Orbns state-backed version of cancel cultureor, to use the correct word, authoritarianismapparently didnt come up in their meeting. Peterson had previously told an interviewer to describe politicians like Orbn not as strongmen, but as dictator wannabes. Nonetheless, the visitand the posed photograph of the men in conversation, released to friendly media outletsgave intellectual cover to Orbns repressive government.

All that time, the two Petersons were pulling away from each other. As the arguments over his message raged across YouTube, Twitter, Facebook, and traditional media, he became an avatar of our polarized media climate. People were consuming completely different Petersons, depending on their news sources. When I saw him on his speaking tour at a theater on Long Island, the first question he was asked was not about pronouns or the decline of Western civilization; it was When was the last time you got drunk? The second was a heartfelt plea that will be familiar to any new parent: How can I get my baby to sleep?

The past two years have clearly been hell for Peterson. In a June 2020 video interview with his daughter, he looked gaunt and restless as he described his struggle with drug dependency, a torment that he revisits in the Overture to Beyond Order, his new book. As he describes it, an allergic reaction during the 2016 Christmas holiday manifested as intense anxiety, leading his family doctor to prescribe benzodiazepines. He also started following what Mikhaila calls the lion diet, consuming only meat, salt, and water. In 2019, the tumultuous reality of [being] a public figure was exacerbated by a series of family health crises culminating in his wifes diagnosis, in April, of what was thought to be terminal cancer. (She has since recovered.) Petersonwho notes that he had been plagued for years by a tendency toward depressionhad his tranquilizer dosage upped, only to experience rising anxiety, followed by the ravages of attempted withdrawal. He was at the edge of the abyssanxiety far beyond what I had ever experienced, an uncontrollable restlessness and need to move overwhelming thoughts of self-destruction, and the complete absence of any happiness whatsoever.

Throughout this turbulent time, Peterson was working on Beyond Order. He makes no claims that his suffering provided a teachable moment (particularly, he notes, when a pandemic has upended lives everywhere). He also declines the opportunity to place his addiction in the context of the prescription-drug-abuse crisis. Peterson seems to have softened his disdain for religion, and as for Tammy, passing so near to death motivated my wife to attend to some issues regarding her own spiritual and creative development. Notably, Peterson is not ready to give up on the heros journey, despite the terror he has endured. All of that misfortune is only the bitter half of the tale of existence, he writes, without taking note of the heroic element of redemption or the nobility of the human spirit requiring a certain responsibility to shoulder.

This book is humbler than its predecessor, and more balanced between liberalism and conservatismbut it offers a similar blend of the highbrow and the banal. Readers get a few glimpses of the fiery online polemicist, but the Peterson of Beyond Order tends instead to two other modes. The first is a grounded clinician, describing his clients troubles and the tough-love counsel he gives them. The other is a stoned college freshman telling you that the Golden Snitch is, like, a metaphor for round chaos the initial container of the primordial element. Some sentences beg to be prefaced with Dude, like these: If Queen Elizabeth II suddenly turned into a giant fire-breathing lizard in the midst of one of her endless galas, a certain amount of consternation would be both appropriate and expected But if it happens within the context of a story, then we accept it. Reading Peterson the clinician can be illuminating; reading his mystic twin is like slogging through wet sand. His fans love the former; his critics mock the latter.

The prose swirls like mist, and his great insight appears to be little more than the unthreatening observation that life is complicated. (If the first book hadnt been written like this too, youd guess that he was trying to escape the butterfly pins of his harshest detractors.) After nearly 400 pages, we learn that married people should have sex at least once a week, that heat and pressure turn coal into diamonds, that having a social life is good for your mental health, and that, for a man in his 50s, Peterson knows a surprising amount about Quidditch. The chapter inviting readers to make one room in your home as beautiful as possible is typically discursive, but unusually enjoyable: Peterson knows his Wordsworth. (It is not free from weirdness, however. At one point, he claims to have looked at 1.2 million paintings on eBay while selecting his living-room decor.) His prose also lights up when he describes the wonder of watching his granddaughter encounter the world.

On the rare occasion that Beyond Order strays overtly into politics, Peterson still cant resist fighting straw men. What Peterson sees as healthy ambition needs to be encouraged in every possible manner, he writes.

But who is reflexively identifying all male ambition as innately harmful? If any mainstream feminist writers are in fact arguing that the West is a patriarchal tyrannyas opposed to simply a patriarchy or male-dominated societyhe should do the reader the favor of citing them. Is he arguing with Gloria Steinem or princess_sparklehorse99 on Tumblr? A tenured professor should embrace academic rigor.

Peterson writes an entire chapter against ideologiesfeminism, anti-capitalism, environmentalism, basically anything ending in ismdeclaring that life is too complex to be described by such intellectual frameworks. Funny story: Theres an academic movement devoted to skepticism of grand historical narratives. Its called postmodernism. That chapter concludes by advising readers to put their own lives in order before trying to change the world. This is not only a rehash of one of the previous 12 rulesClean up your bedroom, he writes, because fans love it when you play the hitsbut also ferocious chutzpah coming from a man who was on a lecture tour well after he should have gone to rehab.

The Peterson of Beyond Order, that preacher of personal responsibility, dances around the question of whether his own behavior might have contributed to his breakdown. Was it really wise to agree to all those brutal interviews, drag himself to all those international speaking events, send all those tweets that set the internet on fire? Like a rock star spiraling into burnout, he was consumed by the pyramid scheme of fame, parceling himself out, faster and faster, to everyone who wanted a piece. Perhaps he didnt want to let people down, and he loved to feel needed. Perhaps he enjoyed having an online army glorying in his triumphs and pursuing his enemies. In our frenzied media culture, can a hero ever return home victorious and resume his normal life, or does the lure of another adventure, another dragon to slay, another lib to own always call out to him?

Either way, he gazed into the culture-war abyss, and the abyss stared right back at him. He is every one of us who couldnt resist that pointless Facebook argument, who felt the sugar rush of the self-righteous Twitter dunk, who exulted in the defeat of an opposing political tribe, or even an adjacent portion of our own. That kind of unhealthy behavior, furiously lashing out while knowing that counterattacks will follow, is a very modern form of self-harm. And yet in Beyond Order, the blame is placed solely on the hypothetically safe but truly dangerous benzodiazepine anti-anxiety medication he was prescribed by his family doctor. The book leaves you wishing that Peterson the tough therapist would ask hard questions of Peterson the public intellectual.

To imagine that Peterson is popular in spite of his contradictions and human frailtiesthe things that drive his critics madis a mistake: He is popular because of them. For a generation that has lost its faith in religion and politics, he is one of notably few prominent figures willing to confront the most fundamental questions of existence: Whats the point of being alive? What kind of personal journey endows our existence with meaning? He is, in many ways, countercultural. He doesnt offer get-rich-quick schemes, or pickup techniques. He is not libertine or libertarian. He promises that life is a struggle, but that it is ultimately worthwhile.

Yet Petersons elevation to guru status has come at great personal cost, a cascade of suffering you wouldnt wish on anybody. It has made him rich and famous, but not happy. We compete for attention, personally, socially, and economically, he writes in Beyond Order. No currency has a value that exceeds it. But attention is a perilous drug: The more we receive, the more we desire. It is the culture wars greatest reward, yet it started Jordan Peterson on a journey that turned a respected but unknown professor into the man strapped into the Russian hospital bed, ripping the tubes from his arms, desperate for another fix.

See the original post:
Review: Beyond Order, by Jordan B. Peterson - The Atlantic

Read More..