Tag Archive for: forces

15,000-strong security forces to safeguard polls in W. Visayas


DEPLOYED. Gov’t forces showcase their assets during the simultaneous multi-agency send-off and turnover ceremonies at the Camp Gen. Martin Teofilo B. Delgado in Iloilo City on Wednesday (May 4, 2022). Over 15,000-strong force of the Philippine National Police, Philippine Army, and the Philippine Coast Guard will secure Western Visayas during the May 9 elections. (Photo courtesy of PRO6 Regional Public Information Office)

ILOILO CITY – Over 15,000 members of the Philippine National Police (PNP), Philippine Army (PA), and the Philippine Coast Guard (PCG) will secure Western Visayas (Region 6) during the May 9 national and local elections.

The PNP will deploy more than 12,000 uniformed personnel, about 3,000 from the military and 600 from the PCG following the simultaneous multi-agency send-off and turnover ceremonies held at the Police Region 6 headquarters at the Camp Martin Delgado in Iloilo City on Wednesday, said Police Regional Office 6 (PRO6) spokesperson Lt. Col. Arnel Solis.

“On the part of the PNP, we are 100 percent ready for the upcoming elections. Our augmentations have already reported to their respective assignments,” he said in an interview on Thursday.

The men and women from various police units have been reminded by PRO 6 director Brig. Gen. Flynn E. Dongbo to ensure that peace and order reign in their respective areas of responsibility, especially those considered areas of concern, and be professional during this election period, he added.

“The deployment for election areas of concern is normal, depending on the requirement of the place. We have quick response teams on standby that can be mobilized to augment the forces in areas where there is a demand for them,” Solis said.

As per the latest meeting of the Regional Joint Security Control Center (RJSCC) chaired by the Commission on Elections (Comelec), Solis said the areas of concern in the region remain at 44; four are classified as yellow, 35 as orange, and five as red.

Yellow means the area has a previous record of election-related incidents (ERI), orange for those with previous ERI and with threats from armed…

Source…

Sequitur Labs and Lenovo join forces to secure AI models at the edge


Sequitur Labs announced that it has been selected by Lenovo as the technology vendor of choice for protecting edge AI computing applications utilized as part of the Lenovo ThinkEdge SE70 platform.

Sequitur Labs Lenovo

ThinkEdge SE70 is a powerful and flexible AI edge platform for enterprise designed to meet the expanding intelligent transformation needs from logistics, transportation and smart cities to retail, healthcare and manufacturing. The new edge solution from Lenovo is powered by the NVIDIA Jetson Xavier NX system on module. Implementing Sequitur as the security suite better ensures that Lenovo’s SE70 isolates dedicated hardware running AI models and delivering inferences and relevant data — thereby helping to secure AI models at the edge.

“Internet of Things (IoT) deployment is a tremendous market opportunity for both solution providers and enterprises based on the ability of AI solutions at the edge to make decisions to optimize operations and support new strategies,” said Blake Kerrigan, General Manager of ThinkEdge, Lenovo Intelligent Devices Group. “Although these devices offer significant upside, there remains an equally great need to better secure and protect the devices and IP in deployment. That’s why we are committed to work with Sequitur Labs to develop our first appliance designed to better protect AI models at the edge.”

Sequitur Labs’ EmSPARK Security Suite was designed to address solutions in industries where embedded security is paramount, in particular, protection of AI models at the edge. Supporting security functions for encryption, storage, data transmission and key/certificate management are delivered by EmSPARK and housed in a microprocessor’s secure memory partition. IoT hardware manufacturers use EmSPARK to easily implement device-level security by addressing technical, IP, supply chain and business process challenges.

Developers can easily build applications that use security enhanced resources without having to become experts in cryptography and complex chip-level security technologies. Overall, the solution reduces security development and deployment time and investment by 40 to 70 percent, significantly reduces risk, and reduces BOM…

Source…

Russian forces have switched off some mobile networks and internet at Zaporizhzhia nuclear plant, IAEA says


Russian police detain a protester in downtown Moscow on March 6.
Russian police detain a protester in downtown Moscow on March 6. (Yuri Kochetkov/EPA-EFE/Shutterstock)

At least 4,640 people were detained during protests in Russia on Sunday, OVD-Info, an independent monitoring group that tracks detentions in Russia, reports.

People have been detained in 147 cities, according to OVD-Info. Since the invasion, more than 13,000 people have been arrested in Russia in anti-war demonstrations, OVD-Info calculates.

CNN cannot independently verify these numbers.

Russian state news agency TASS cited the Russian Interior Ministry, which said it arrested 3,500 people “who took part in unauthorized public events” on Sunday. 

“The units of the Ministry of Internal Affairs of Russia, in cooperation with other law enforcement agencies, ensured law and order in places where unauthorized public events were held in a number of constituent entities of the Russian Federation,” Irina Volk, the official representative of the Russian Interior Ministry said, TASS reported.

Some of the cities where arrests were made included Moscow and St. Petersburg.

The detainees were “taken to the territorial police departments for investigation,” Volk said, adding “the issue of bringing them to justice is being decided.”

Source…

Russia and China devote more cyber forces to offensive operations than US, says new report


WASHINGTON — Russia and China have each dedicated significantly more military cyber forces to conducting cyber effects than the United States, according to research by a London-based think tank.

The International Institute for Strategic Studies’ Military Balance+ database, which evaluates global military trends, sought to provide a breakdown assessing the military cyber capabilities of these nations based mostly on active duty military forces with a responsibility for cyberspace operations (though some data was gathered on reservist units).

According to the report, 33% of Russia’s military cyber forces are focused on effects, compared to 18.2% of Chinese military forces and 2.8% of U.S. forces. This data was derived from the composition of principal cyber forces according to roles assigned to individual units.

Authors of the report clarified that “effects” generally refers to actions to deny, degrade, disrupt or destroy as well as those conducted by proxies in conjunction with a government actor. It can also include a range of other capabilities such as the ability to research vulnerabilities, write or use malware, and maintain command and control through exploits.

“Russia is a highly capable cyber power. Cyber capabilities are part of a broader framework of information operations, and strategic documents generally refer to cyber security under the rubric of ‘information security,’ ” the Military Balance report read.

In July 2021, Russia released an update to its National Security Strategy, devoting a section to information security and stressing the further development of military cyber forces and capabilities.

The IISS report noted that China has also shown significant improvements in its military cyber capabilities over the last decade, integrating offensive cyber operations into recent military exercises.

Russia also allots a significant amount of personnel to incident response, the report noted, with 80% of its forces dedicated to the mission. That is compared with 29% on the U.S. side and 9.1% on the Chinese side.

All three nations dedicated roughly the same proportion of forces to conducting cyber intelligence, surveillance and reconnaissance, hovering between…

Source…