Saturday, October 03, 2020

Now this is how a smart intelligence service would operate. IF I had to guess, I’d say GCHQ.

https://www.zdnet.com/article/eset-discovers-a-rare-apt-that-stayed-undetected-for-nine-years/?&web_view=true

ESET discovers a rare APT that stayed undetected for nine years

Active since 2011 but only discovered this year, the XDSpy hacker group targeted government and private companies in Belarus, Moldova, Russia, Serbia, and Ukraine.

Slovak cyber-security firm ESET has discovered a new state-sponsored hacking group (also known as an APT). Named XDSpy, the group is a rarity in the cyber-security landscape as it managed to remain undetected for nearly nine years before its hacking spree was discovered earlier this year.

The group's operations have been detailed for the first time today by ESET researchers in a talk at the Virus Bulletin 2020 security conference.

ESET says the group's primary focus has been reconnaissance and document theft. Its targets have been government agencies and private companies in Eastern Europe and the Balkans.





From each according to his revenue, to each according to his hacking ability.

https://www.zdnet.com/article/ransomware-gangs-are-shifting-targets-and-upping-their-ransom-demands/?&web_view=true

Ransomware: Gangs are shifting targets and upping their ransom demands

Gangs are also getting smarter, factoring in companies' revenues when setting the ransom they try to collect.

The number of ransomware attacks IBM's Security X-Force Incident Response team were called in to deal with tripled in the second quarter of this year compared to the previous quarter, and accounted for a third of all security incidents it responded to between April and June 2020. "Ransomware incidents appeared to explode in June 2020," said a report by the company's security analysts.





No answer yet?

https://www.openaccessgovernment.org/govern-artificial-intelligence/95468/

How do we govern artificial intelligence and act ethically?

Gaurav Kapoor, Chief Operating Officer at MetricStream, discusses how to govern artificial intelligence in the contemporary age





For our next trick, perpetual motion!

https://phys.org/news/2020-10-physicists-circuit-limitless-power-graphene.html

Physicists build circuit that generates clean, limitless power from graphene

… The findings, published in the journal Physical Review E, are proof of a theory the physicists developed at the U of A three years ago that freestanding graphene—a single layer of carbon atoms—ripples and buckles in a way that holds promise for energy harvesting.

The idea of harvesting energy from graphene is controversial because it refutes physicist Richard Feynman's well-known assertion that the thermal motion of atoms, known as Brownian motion, cannot do work. Thibado's team found that at room temperature the thermal motion of graphene does in fact induce an alternating current (AC) in a circuit, an achievement thought to be impossible.





A remote teaching tool.

https://www.freetech4teachers.com/2020/10/how-to-record-video-presentation-in.html

How to Record a Video Presentation in Canva

For years Canva has been my go-to tool for making things like infographics, video cover images, and social media posts. Increasingly, I'm using it to design slideshows. A relatively new feature in Canva is the option to record a video of the presentations that you create in Canva. It's kind of like making a narrated screencast of your slides. The difference is that you can do all of the recording right in Canva and you can see your speaker notes to help you through the recording but the speaker notes don't get included in the final video. Take a look at my new video that is embedded below to see how Canva's built-in presentation recording tool works.



Friday, October 02, 2020

Another consideration in the ransomware environment. Ignorance of double-secret probation is no excuse.

https://www.reuters.com/article/us-treasury-cyber/companies-may-be-punished-for-paying-ransoms-to-sanctioned-hackers-u-s-treasury-idUSKBN26M77U?&web_view=true

Companies may be punished for paying ransoms to sanctioned hackers - U.S. Treasury

Facilitating ransomware payments to sanctioned hackers may be illegal, the U.S. Treasury said on Thursday, signaling a crackdown on the fast-growing market for consultants who help organizations pay off cybercriminals.

In a pair of advisories, the Treasury’s Office of Foreign Assets Control and its Financial Crimes Enforcement Network warned that facilitators could be prosecuted even if they or the victims did not know that the hackers demanding the ransom were subject to U.S. sanctions.





A self-inflicted failure…

https://cybernews.com/news/germany-fines-hm-35-million-euros-for-data-protection-breaches/?web_view=true

Germany fines H&M 35 million euros for data protection breaches

The regional data protection authority in Hamburg has imposed an administrative fine of 35 million euros. The H&M group admits shortcomings at the service centre and has taken forceful measures to correct this,” it said in its June-August earnings report.

German daily Frankfurter Allgemeine Zeitung last year reported that the State Data Protection Commissioner in Hamburg had launched a probe into H&M management unlawfully sounding out workers about their personal life and storing the details.

According to the paper, H&M collected information on illnesses and other personal circumstances of employees at the centre. H&M said in January the breaches found were unacceptable and it was cooperating with the authorities.





Another poor reaction.

https://www.databreaches.net/magnolia-pediatrics-notifies-patients-of-a-security-incident-after-ocr-tells-them-its-reportable/

Magnolia Pediatrics notifies patients of a security incident after OCR tells them it’s reportable

Almost one year after Magnolia Pediatrics notified 11,000 patients about a ransomware attack on an unnamed IT vendor, they are now notifying more than 12,000 patients of another attack. This time, they wound up firing their vendor.

According to a notification on their web site, on March 26, the Magnolia Pediatrics discovered a security incident. Their IT vendor, LaCompuTech, investigated and reportedly told them that the only information that was compromised was the Master Boot Record, and that no patient information had been accessed, exfiltrated, or encrypted. According to Magnolia Pediatrics, LaCompuTech advised Magnolia that this was not a HIPAA breach and no notification to patients was required.

Why Magnolia would rely on their tech vendor for legal advice on their HIPAA obligations instead of calling their practice lawyer was not explained. [I suspect it was cheaper that way. Bob]

In any event, on September 11, OCR contacted Magnolia and informed them that this was a reportable incident because any individual who had the ability to encrypt the MBR had access to the entire server and therefore all the protected health information on it.

As a result, Magnolia Pediatric began contacting more than 12,000 patients — even though no protected health information was exfiltrated or copied or directly accessed.

The notification, reproduced below, does not explain how OCR became aware of the incident. Nor does it indicate whether the vendor was the same vendor who had the ransomware attack in 2019 and who paid the ransom to resolve that one.

DataBreaches.net reached out to LaCompuTech to inquire whether they were the same vendor involved in the ransomware incident and will update this post if a response is received.

In any event, one takeaway from this one seems to be a reminder to have a lawyer who is knowledgeable about HIPAA to advise you on your obligations and to consult with them.

As of today’s date, neither of the practice’s two HIPAA incidents are marked as closed by OCR.





Their third or fourth try…

https://fpf.org/2020/10/01/fpf-comments-on-draft-washington-privacy-act-of-2021/

FPF Comments on Draft Washington Privacy Act of 2021

Yesterday, on September 30, 2020, FPF submitted comments regarding the draft Washington Privacy Act of 2021. The draft was released by Senator Carlyle, the Chair of the Washington State Senate Committee on Environment, Energy, and Technology (EET) on September 9, 2020.

The new version closely resembles last year’s Second Substitute version of the Washington Privacy Act of 2020 (SSB 6281 ), with a few changes that reflect House amendments from the previous legislative session. In addition, the new draft WPA contains two new sections that would regulate the collection and use of COVID-19-related data by both public and private entities. It is anticipated that the Act will be officially introduced in Washington State at the beginning of 2021.





Perspective.

https://arstechnica.com/gadgets/2020/10/sourcegraph-devs-are-managing-100x-more-code-now-than-they-did-in-2010/

Sourcegraph: Devs are managing 100x more code now than they did in 2010

Before diving into the data, it's important to understand the angle the survey is coming from. Sourcegraph's own business model is enabling code search at an enterprise scale—which means not just grep -r'ing your way through a directory, but simultaneously searching across a potentially vast array of repositories, both local and cloud, and with support for just about any language you can think of.

Another chart we found interesting was specific to developers at companies that have not traditionally been considered technology companies—such as insurance, retail, and even food and beverage companies. Of the developers surveyed, 91 percent say their non-technology company functions more like a technology company than it did ten years ago. This won't surprise anyone who has noticed firms like Walmart Labs sponsoring open source technology conferences and delivering presentations.

The full survey results are available for download in PDF form.





Tools & Techniques.

https://www.bespacific.com/7-powerful-search-engines-for-social-networks/

7 Powerful Search Engines for Social Networks

Make Use Of: “Are you looking for a long-lost friend or an ex-colleague? Perhaps you’re trying to catch up with the weirdest trends on social media? If so, you’ll need a way to search social networks. There have been some awfully weird trends on social media. How many of these do you remember? How many have you taken part in? Of course, most social networks have their own search engines built in, but they’re fundamentally limited by the fact they can only search their own database. And how you are supposed to know whether Aunt Mary is on Facebook, Twitter, or one of the other myriad options? The solution? Use a network-agnostic social search engine. They can search all of the most common networks, as well as lots of the niche, smaller ones…”





Tools & Techniques.

https://boingboing.net/2020/10/01/new-photo-enhancing-ai-includes-physical-damage-restoration-option.html

New photo enhancing AI includes physical damage restoration option

YouTuber bycloud takes viewers through Microsoft's new AI for repairing old photos, which he says "is probably the best physical damage restoration for images I've ever seen." The supporting academic paper is Bringing Old Photos Back to Life. Results still have a significant range of quality, but some of the best ones are quite impressive.

For those interested in trying it out, he also made a GitHub tutorial:





Resources.

https://thenextweb.com/neural/2020/10/02/a-beginners-guide-to-the-math-that-powers-machine-learning-syndication/

A beginner’s guide to the math that powers machine learning

How much math knowledge do you need for machine learning and deep learning? Some people say not much. Others say a lot. Both are correct, depending on what you want to achieve.

In this post, I will introduce some of my favorite machine learning math resources. And while I don’t expect you to have fun with machine learning math, I will also try my best to give you some guidelines on how to make the journey a bit more pleasant.

my personal favorite is Khan Academy’s math courses. Sal Khan has done a great job of putting together a comprehensive collection of videos that explain different math topics. And it’s free, which makes it even better.





I honestly wish the President a fast and full recovery, but I can’t help wondering if he will try intravenous Clorox or Hydroxychloroquine or any of the other “cures” he has recommended.

https://www.foxnews.com/politics/president-trump-confirms-he-first-lady-melania-trump-tested-positive-for-coronavirus

President Trump, first lady test positive for coronavirus, set to quarantine at White House



Thursday, October 01, 2020

Articles like this should help ‘sell’ your Computer Security budget.

https://www.reuters.com/article/us-anthem-cyber/anthem-to-pay-nearly-40-million-to-settle-data-breach-probe-by-u-s-states-idUSKBN26L2PW?&web_view=true

Anthem to pay nearly $40 million to settle data breach probe by U.S. states

Anthem Inc said on Wednesday it would pay $39.5 million as part of a settlement with U.S. states attorneys general following an investigation into a massive cyber-attack at the company in 2015.

The second largest U.S. health insurer said a state sponsored criminal group had perpetrated the attack, adding that it does not believe the company had violated the law in connection with its data security.





Speaking of budget planning…

https://www.theregister.com/2020/09/30/cyber_war_fears/?&web_view=true

Business top brass are terrified their companies will simply be collateral damage in a future cyber-war

Organizations need not fear a direct hit – someone knackering the internet or the grid would be enough

Bitdefender’s latest report, titled 10 in 10, surveyed around 6,000 C-suite bods responsible for cyber security and found [PDF ] “over a fifth” of these said that cyber warfare was one of the most challenging topics they had to convince their colleagues to take seriously.





Another tool.

https://www.zdnet.com/article/github-rolls-out-new-code-scanning-security-feature-to-all-users/?&web_view=true

GitHub rolls out new Code Scanning security feature to all users

Code-hosting website GitHub is rolling out today a new security feature named Code Scanning for all users, on both paid and free accounts.

GitHub says the new Code Scanning feature "helps prevent vulnerabilities from reaching production by analyzing every pull request, commit, and merge—recognizing vulnerable code as soon as it's created."





Each with their own idiosyncrasies.

https://www.cpomagazine.com/data-protection/gartner-projects-major-jump-in-data-privacy-regulations-from-10-of-the-world-covered-in-2020-to-65-in-2023/

Gartner Projects Major Jump in Data Privacy Regulations; From 10% of the World Covered in 2020 to 65% in 2023

Global research firm Gartner recently conducted its annual Security & Risk Management Summit, and perhaps the biggest headline to come out of it was the projection that the majority of the world will be covered by data privacy regulations by 2023.

This would be a very substantial jump in a relatively short period of time. At present, only about 10% of the world has strong privacy regulations akin to the EU General Data Protection Regulation (GDPR). Gartner believes that the GDPR will be the specific model upon which most of these new privacy regulations are based.

Gartner is expecting these global changes to be driven in no small part by the GDPR’s “trusted partner” standards for anyone handling the personal data of EU residents.





TikTok could be just the first in a long series.

https://www.bespacific.com/tiktok-technology-overview-and-issues/

TikTok: Technology Overview and Issues

CRS report via LC – TikTok: Technology Overview and Issues, Updated September 29, 2020:” TikTok is a globally popular video-sharing smartphone application (app) owned by ByteDance Ltd., a privately held company headquartered in Beijing, China. It is under increasing scrutiny by the U.S. government as a potential privacy and security risk to U.S. citizens. This is because ByteDance, like all technology companies doing business in China, is subject to Chinese laws that require companies operating in the country to turn over user data when asked to by the government. Researchers differ over how TikTok’s collection of user data compares with other social media apps and whether TikTok poses a unique threat to the privacy and security of its U.S. users… Some believe TikTok and other Chinese-owned apps pose a serious security risk to the United States because Chinese companies are subject to China’s laws that require compliance with government requests for data. Others believe that TikTok has fallen into “the crosshairs of a global technology battle” based on technology trade protectionism (this concept, also called “techno-nationalism,” refers to a country’s refusal or reluctance to import other countries’ advanced technology, as well as to export, or to allow other nations to benefit from, its own advanced technology). Similar situations may arise in the future with other apps created by foreign companies. Options that Congress may consider include (1) developing an overarching legal and regulatory framework to protect the security and privacy of U.S. citizens’ data and communications, and (2) developing a uniform, transparent process to assess and mediate risks posed by foreign apps.





Are we there yet? (Also discussed in a podcast.)

https://www.zdnet.com/article/the-state-of-ai-in-2020-democratization-industrialization-and-the-way-to-artificial-general-intelligence/

The state of AI in 2020: democratization, industrialization, and the way to artificial general intelligence

In the State of AI Report 2020 released today, Benaich and Hogarth outdid themselves. While the structure and themes of the report remain mostly intact, its size has grown by nearly 30 percent. This is a lot, especially considering their 2019 AI report was already a 136 slide long journey on all things AI.





No surprise.

https://www.forbes.com/sites/carlypage/2020/10/01/ai-has-resulted-in-ethical-issues-for-90-of-businesses/#80adb583ff0e

AI Has Resulted In “Ethical Issues” For 90% Of Businesses

A new report from Capgemini has revealed that 90% of organizations are aware of at least one instance where an AI system had resulted in ethical issues for their business.

The report, titled “AI and the Ethical Conundrum: How organizations can build ethically robust AI systems and gain trust has found that while digital and AI-enabled interactions with customers are on the rise as customers seek contactless or non-touch interfaces amid the COVID-19 pandemic, systems are still being designed without due concern for ethical issues.





Consider reducing your labor costs to “Trivial.”

https://www.weforum.org/agenda/2020/09/countries-comparison-robot-workers-robotics-change-tech-manufacturing

These are the countries with the highest density of robot workers

The rise of the machines has well and truly started. Data from the International Federation of Robotics reveals that the pace of industrial automation is accelerating across much of the developed world with 74 installed industrial robots per 10,000 employees globally in 2016. By 2020, that increased to 113 across the manufacturing sector. Asia now has a robot density of 118 units per 10,000 workers and that figure is 114 and 103 in Europe and the Americas, respectively. China is one of the countries recording the highest growth levels in industrial automation but nowhere has a robot density like South Korea.





The first thing we do, let’s automate all the lawyers!

https://www.zdnet.com/article/docusign-analyzer-aims-to-save-legal-costs-labor-with-ai-aided-contract-negotiations/

DocuSign Analyzer aims to save legal costs, labor with AI-aided contract negotiations

Here's how DocuSign Analyzer works:

  • Analyzer breaks an incoming agreement down to individual clauses using AI.

  • A risk assessment is provided based on a company's own legal and business standards.

  • Risk scorecards are generated and available in Microsoft Work, Outlook and DocuSign's contract lifecycle management application.

  • Analyzer offers recommended replacement language from a library of preapproved clauses that can come DocuSign templates.





Tools & Techniques.

https://www.bespacific.com/book-review-a-short-and-happy-guide-to-advanced-legal-research/

Book Review: A Short And Happy Guide To Advanced Legal Research

Via LLRX Book Review: A Short And Happy Guide To Advanced Legal Research Nicole L. Black’s review highlights this book’s breadth of coverage and its format, information about a variety of free online tools, including public records databases, newsletters, and encyclopedias, and case law and statutes, fee-based legal research tools, as well as traditional case law and statutory research tools, and cutting edge AI-based legal research and data analytics software.





Resources.

https://www.geeksforgeeks.org/top-5-open-source-online-machine-learning-environments/

Top 5 Open-Source Online Machine Learning Environments





Music for the unmusical? Could this find the next Mozart?

https://thenextweb.com/neural/2020/10/01/googles-new-machine-learning-tool-turns-your-awful-humming-into-a-beautiful-violin-solo/

Google’s new machine learning tool turns your awful humming into a beautiful violin solo

Google‘s new machine learning algorithm experiment, Tone Transfer, makes that fantasy come true — at least to an extent.

The idea is simple. Go to the Tone Transfer site from your Android phone or desktop (Windows or Mac), select “Add your own,” and record your 15-second hum or tune. You can use your voice, tap on your table, or play an actual instrument. Google’s machine learning algorithm will convert that tune into a digital signal, and then you can convert it into a tune with Flute, Saxophone, Violin, or Trumpet.

You can check out the paper related to DDSP here and try out the tool here.



Wednesday, September 30, 2020

For better phishing you need better bait.

https://www.zdnet.com/article/this-worm-phishing-campaign-is-a-game-changer-in-password-theft-account-takeovers/?&web_view=true

This worm phishing campaign is a game-changer in password theft, account takeovers

"The phishing emails were being sent as replies to genuine emails," the researcher explained. "Emails exchanged between our people and our suppliers, our customers, and even internally between colleagues."

This is how it worked: once one email account was compromised, the credentials for the account were sent to a remote bot. The bot would then sign into the account and analyze emails sent within the past several days.

"For each unique email chain it found, it replied to the most recent email with a link to a phishing page to capture credentials," Hays said. "The wording was generic enough to fit almost any scenario and the link to a 'document' didn't feel out of place."





All waiting for a command to go active?

https://www.zdnet.com/article/these-hackers-have-spent-months-hiding-out-in-company-networks-undetected/?&web_view=true

These hackers have spent months hiding out in company networks undetected

A cyber-espionage campaign is using new malware to infiltrate targets around the world including organisations in media, finance, construction and engineering.

Detailed by cybersecurity company Symantec, the attacks against organisations in the US, Japan, Taiwan and China are being conduced with the aim of stealing information and have been linked to an espionage group known as Palmerworm – aka BlackTech – which has a history of campaigns going back to 2013.





A (very) little more detail.

https://krebsonsecurity.com/2020/09/whos-behind-mondays-14-state-911-outage/

Who’s Behind Monday’s 14-State 911 Outage?

Emergency 911 systems were down for more than an hour on Monday in towns and cities across 14 U.S. states. The outages led many news outlets to speculate the problem was related to Microsoft‘s Azure web services platform, which also was struggling with a widespread outage at the time. However, multiple sources tell KrebsOnSecurity the 911 issues stemmed from some kind of technical snafu involving Intrado and Lumen, two companies that together handle 911 calls for a broad swath of the United States.

On the afternoon of Monday, Sept. 28, several states including Arizona, California, Colorado, Delaware, Florida, Illinois, Indiana, Minnesota, Nevada, North Carolina, North Dakota, Ohio, Pennsylvania and Washington reported 911 outages in various cities and localities.





For your consideration (and planning?)

https://www.zdnet.com/article/microsoft-some-ransomware-attacks-take-less-than-45-minutes/?&web_view=true

Microsoft: Some ransomware attacks take less than 45 minutes

While Microsoft unceremoniously retired the old SIR reports back in 2018, the OS maker appears to have realized its mistake, and has brought it back today, rebranded as the new Microsoft Digital Defense Report.



(Related) More on ransomware.

https://www.schneier.com/blog/archives/2020/09/negotiating-with-ransomware-gangs.html

Negotiating with Ransomware Gangs

Really interesting conversation with someone who negotiates with ransomware gangs:





Probably impossible to control…

https://www.insideprivacy.com/data-privacy/edpb-publishes-draft-guidelines-on-the-targeting-of-social-media-users/

EDPB Publishes Draft Guidelines on the Targeting of Social Media Users

On 7 September 2020, the European Data Protection Board (“EDPB”) adopted draft guidelines on the targeting of social media users (the “Guidelines”). The Guidelines aim to clarify the roles and responsibilities of social media providers and “targeters” with regard to the processing of personal data for the purposes of targeting social media users.

Targeting services allow natural or legal persons (i.e., targeters) to communicate specific messages to the users of social media in order to advance commercial, political or other interests. The Guidelines state that the mechanisms social media providers can use to target users, as well as the underlying processing activities, may pose significant risks to users, including loss of control over their personal data, discrimination and exclusion as a result of targeting on the basis of special categories of personal data, and manipulation through misinformation. The Guidelines also raise specific concerns in relation to children.





On the slippery slope? “We what everything and we’ll keep it forever.”

https://www.bespacific.com/collection-and-use-of-biometrics-by-u-s-citizenship-and-immigration-services/

Collection and Use of Biometrics by U.S. Citizenship and Immigration Services

EFF – “On September 11, 2020, the Department of Homeland Security (DHS) announced its intention to significantly expand both the number of people required to submit biometrics during routine immigration applications and the types of biometrics that individuals must surrender. This new rule will apply to immigrants and U.S. citizens alike, and to people of all ages, including, for the first time, children under the age of 14. It would nearly double the number of people from whom DHS would collect biometrics each year, to more than six million. The biometrics DHS plans to collect include palm prints, voice prints, iris scans, facial imaging, and even DNA—which are far more invasive than DHS’s current biometric collection of fingerprints, photographs, and signatures. (For an incisive summary of the proposed changes, click here.)…”



(Related)

Privacy of biometric data in DHS hands in doubt, inspector general says

Dean DeChiaro reports:

An inspector general’s report is casting doubt on the Department of Homeland Security’s ability to protect its massive repository of personal data from hackers amid a push by the Trump administration to vastly expand its collection of biometrics through the use of facial recognition and other tools.

The report, released by the DHS inspector general’s office on Sept. 23, found that U.S. Customs and Border Protection failed to protect a collection of 184,000 facial images of cross-border travelers prior to a massive data breach last year. At least 19 of the images, which were collected through a pilot program at the Anzalduas Port of Entry in Texas, were later posted on the dark web.

Read more on Roll Call.





Perhaps a guide for future laws?

https://www.cpomagazine.com/data-protection/early-results-indicate-half-of-ccpa-data-subject-requests-are-made-to-stop-sale-of-personal-information/

Early Results Indicate Half of CCPA Data Subject Requests Are Made to Stop Sale of Personal Information

The California Consumer Privacy Act (CCPA) went active at the start of 2020, and data from the first half of its first year indicates that state residents are primarily using it to opt out of the sale of personal information. Nearly 50% of data subject requests are made for that purpose, compared to 31% for data deletion and 21% for access to collected personal information.

Conducted by privacy management firm DataGrail, the Mid-Year CCPA Trends Report 2020 is meant to provide insights to organizations on patterns of data subject requests (DSRs) that they can expect under the new law.





An interesting podcast.

https://www.technologyreview.com/2020/09/29/1008933/how-ai-will-revolutionize-manufacturing/

How AI will revolutionize manufacturing

Ask Stefan Jockusch what a factory might look like in 10 or 20 years, and the answer might leave you at a crossroads between fascination and bewilderment. Jockusch is vice president for strategy at Siemens Digital Industries Software, which develops applications that simulate the conception, design, and manufacture of products like cell phones or smart watches. His vision of a smart factory is abuzz with “independent, moving” robots. But they don’t stop at making one or three or five things. No—this factory is “self-organizing.”





Free is good. (Also free webinars)

https://www.geospatialworld.net/news/2020-prepare-ai-conference-now-free-for-all/

2020 Prepare.ai Conference now free for all

3rd-Annual St. Louis-based AI & Tech Conference featuring nationally-known thought-leaders across multiple disciplines will now be free and open to all.

[Register here: https://prepare.ai/





It can’t hurt and may attract students who learn best this way.

https://www.govtech.com/civic/Comic-Book-Bridges-Gap-Around-Education-in-AI-Ethics.html

Comic Book Bridges Gap Around Education in AI, Ethics

The Data, Responsibly project, based out of New York University, has taken its research on responsible data management and expanded it to improve messaging around what it means to collect and use data ethically.

You can find this AI comic and future comics here.





For my researchers.

https://www.freetech4teachers.com/2020/09/internet-archive-scholar-academic.html

Internet Archive Scholar - An Academic Version of the Internet Archive

The Internet Archive warehouses all kinds of fantastic materials (and some not-so-fantastic) that can be useful to teachers and students. The trouble with it is the organization is a little clunky for research purposes. Even if you limit the scope of your search to webpages and text you can still spend a lot of time weeding out material that isn't academic in nature. That could be changing now that Internet Archive Scholar is on the horizon.

Internet Archive Scholar is a new project from the Internet Archive. It is focused on providing access to academic articles and journals from the 18th Century through today. Internet Archive Scholar is very new. It's so new that it's labeled as being "in alpha" and when you visit it there is a message warning you that there may be several bugs and that it has not been "officially announced." None-the-less, I gave it a try and made a video about it. Here's my video overview of Internet Archive Scholar.

As I mentioned in the video above, Internet Archive Scholar has the potential to be a good alternative and or complement to Google Scholar. Like Google Scholar, Internet Archive Scholar could provide high school and college students with some good resources to consult that they would not find through a Google or Bing search.