Send Link mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        https://mailman.anu.edu.au/mailman/listinfo/link
or, via email, send a message with subject or body 'help' to
        [email protected]

You can reach the person managing the list at
        [email protected]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Link digest..."


Today's Topics:

   1. Aussie gov trial of Microsoft AI Copilot (Stephen Loosley)
   2. Wired: 'Typhoon Spies Hack Cisco Routers' (Roger Clarke)


----------------------------------------------------------------------

Message: 1
Date: Thu, 13 Feb 2025 23:56:06 +1030
From: Stephen Loosley <[email protected]>
To: "link" <[email protected]>
Subject: [LINK] Aussie gov trial of Microsoft AI Copilot
Message-ID: <[email protected]>
Content-Type: text/plain; charset="UTF-8"


After Copilot trial, Australian government staff rated Microsoft's AI less 
useful than expected

Not all bad news for Redmond as the government agency also found strong ROI and 
some unexpected upsides



By Simon Sharwood Wed 12 Feb 2025 
https://www.theregister.com/2025/02/12/australian_treasury_copilot_pilot_assessment/


Australia?s Department of the Treasury has found that Microsoft?s Copilot can 
easily deliver return on investment, but staff exposed to the AI assistant came 
away from the experience less confident it will help them at work.

The Department conducted a 14-week trial of Microsoft 365 Copilot during 2024 
and asked for volunteers to participate. 218 put up their hands and then 
submitted to surveys about their experiences using Microsoft?s AI helpers. 

Those surveys are the basis of an evaluation report published on Tuesday ..

https://evaluation.treasury.gov.au/publications/evaluation-generative-artificial-intelligence

The report reveals that after the trial participants rated Copilot less useful 
than they hoped it would be, as it was applicable to fewer workloads than they 
hoped would be the case.

Participant ratings of Copilot?s impact on work quality .. (graphics)

Usage of Copilot was lower than expected, with most participants using it two 
or three times a week, or less. reported using Copilot 2?3 times per week or 
less. 

Treasury thinks it probably set unrealistically high expectations before the 
trial, and noted that participants often suggested extra training would be 
valuable.

The trial proposed four use cases for Copilot - generating structured content, 
supporting knowledge management, synthesising and prioritising information, and 
undertaking process tasks - and participants agreed they were appropriate. 

But the report also found they also emerged with the belief that ?Copilot was 
not appropriate for more complex tasks, mostly due to the limitations of the 
product itself.?

The tasks participants felt Copilot handled best were ?finding and summarising 
information, generating meeting minutes, knowledge management and drafting 
content?. The report describes those as ?basic administrative tasks?.

But saving even a little time on such tasks can pay off: the report finds that 
if Copilot saves 13 minutes a week for mid-level workers, it will pay for 
itself.

Other News:

    Microsoft 365 price rises are coming ? pay up or opt out (if you can find 
the button)
    You begged Microsoft to be reasonable. Instead it made Copilot reason-able 
with OpenAI GPT-o1
    Why is Big Tech hellbent on making AI opt-out?
    Microsoft teases Copilot Vision, the AI sidekick that judges your tabs


Other findings Microsoft will likely appreciate include the unanticipated 
benefit that Copilot displayed helped ?to contribute to accessibility and 
inclusion for neurodivergent and part-time staff, or those experiencing medical 
conditions that require time off work.?

The AI assistant did so by producing automatic summaries of missed meetings and 
?levelling the playing field for those who struggle to navigate workplace norms 
or culture.? Some staff therefore reported ?a small increase in work 
confidence?, with junior or recent hires more likely to express such sentiments.

Treasury?s learnings from the pilot include more careful selection of staff who 
use Copilot, the need for more consideration of necessary training on how to 
use AI and the risks of doing so, and the desirability of ongoing monitoring to 
test AI?s impact in the workplace.

Another finding suggests as-a-service AI might not be appropriate for agencies 
like Treasury.

?While security of protected government data and advice is of upmost 
importance, ideally the core functions of a generative AI product should work 
alongside security requirements,? the report states. ?It is not clear whether 
products are likely to evolve over time to meet Treasury?s strict security 
needs, or whether Copilot itself will continue to evolve to incorporate 
external information into its outputs without feeding the algorithm with 
internal Treasury data.?

That opinion suggests orgs that handle sensitive information will likely do 
better with on-prem AI infrastructure. 

---



------------------------------

Message: 2
Date: Fri, 14 Feb 2025 08:41:56 +1100
From: Roger Clarke <[email protected]>
To: link <[email protected]>
Subject: [LINK] Wired: 'Typhoon Spies Hack Cisco Routers'
Message-ID: <[email protected]>
Content-Type: text/plain; charset=UTF-8; format=flowed


China?s Salt Typhoon Spies Are Still Hacking Telecoms?Now by Exploiting 
Cisco Routers
ANDY GREENBERG
Wired
FEB 13, 2025 12:00 AM
https://www.wired.com/story/chinas-salt-typhoon-spies-are-still-hacking-telecoms-now-by-exploiting-cisco-routers/

...
 > To carry out this latest campaign of intrusions, Salt Typhoon?which 
Recorded Future tracks under its own name, RedMike, rather than the 
Typhoon handle created by Microsoft?has targeted the internet-exposed 
web interfaces of Cisco's IOS software, which runs on the networking 
giant's routers and switches. The hackers exploited two different 
vulnerabilities in those devices' code, one of which grants initial 
access, and another that provides root privileges, giving the hackers 
full control of an often powerful piece of equipment with access to a 
victim's network.
 >
 > ?Any time you're embedded in communication networks on infrastructure 
like routers, you have the keys to the kingdom in what you're able to 
access and observe and exfiltrate,? Gundert says.
 >
 > Recorded Future found more than 12,000 Cisco devices whose web 
interfaces were exposed online, and says that the hackers targeted more 
than a thousand of those devices installed in networks worldwide. Of 
those, they appear to have focused on a smaller subset of telecoms and 
university networks whose Cisco devices they successfully exploited. For 
those selected targets, Salt Typhoon configured the hacked Cisco devices 
to connect to the hackers' own command-and-control servers via generic 
routing encapsulation, or GRE tunnels?a protocol used to set up private 
communications channels?then used those connections to maintain their 
access and steal data.
 >
 > When WIRED reached out to Cisco for comment, the company pointed to a 
security advisory it published about vulnerabilities in the web 
interface of its IOS software in 2023. ?We continue to strongly urge 
customers to follow recommendations outlined in the advisory and upgrade 
to the available fixed software release,? a spokesperson wrote in a 
statement.

______

That range a bell.

In an interview with IEEE Spectrum, many years ago, I speculated that 
not only would Chinese-manufactured backbone routers contain trapdoors 
for the PRC to exploit, but that Cisco and Juniper would have no 
alternative but to comply with the same requirement.

I expressed concern that normal economic path-of-least-resistance would 
mean that those trapdoors would end up in the backbone routers sold 
everywhere else in the world, with or without any intent on the part of 
Cisco, Juniper or the NSA.


Ah, I archived the article.  Steven Cherry wrote on 1 Jun 2005:
http://www.rogerclarke.com/II/Cherry-2005.pdf

 > ... The issue of how China continues to censor its Internet, even as 
its infrastructure becomes vastly more sophisticated, has implications 
beyond what ideas China?s populace?almost one-fifth of humanity?will be 
allowed to tap into. For one thing, if censorship technology flourishes 
in China, it will be easier and cheaper for it to also take root 
elsewhere. ?The concern I have is that this is laying the foundation for 
a much more intrusive and censorship-friendly Internet infrastructure 
for all countries,? says Roger Clarke, a consultant in Canberra, 
Australia, affiliated with the Australian National University. ?The 
features that China wants installed in intermediating devices and 
software will gradually find their way into all of the suppliers? 
products, if only because it?s cheaper that way.?

...

 > In an interview, [journalist Ethan] Gutmann reiterated a charge 
documented in his book that China ?could not have controlled this 
radical new means of communication without overwhelming technical 
assistance from North American corporations.? In his book he quotes, 
among other sources, unnamed Cisco representatives and a non-Cisco 
Internet engineer, identified only as Wen, who all claim that Cisco 
modified its equipment and software at the censors? bidding.

(I wasn't aware of Gutmann's book at the time. ]


-- 
Roger Clarke                            mailto:[email protected]
T: +61 2 6288 6916   http://www.xamax.com.au  http://www.rogerclarke.com

Xamax Consultancy Pty Ltd      78 Sidaway St, Chapman ACT 2611 AUSTRALIA 

Visiting Professorial Fellow                          UNSW Law & Justice
Visiting Professor in Computer Science    Australian National University


------------------------------

Subject: Digest Footer

_______________________________________________
Link mailing list
[email protected]
https://mailman.anu.edu.au/mailman/listinfo/link


------------------------------

End of Link Digest, Vol 387, Issue 7
************************************

Reply via email to