Monday, August 09, 2021

On the other hand, there is no good news.

https://www.cpomagazine.com/cyber-security/if-only-you-knew-how-to-really-plan-for-a-serious-data-breach/

If Only You Knew: How to Really Plan For a Serious Data Breach

Your organization has an incident response plan and a relationship with a consulting firm that can help contain and remediate a major data breach when it happens. And, of course, you have cyber and data breach insurance to cover damages. That’s great.

What if I told you none of this makes much of a difference when the nightmare breach scenario actually happens? Sure, an incident response plan is a great start, but most of those plans focus on the technical and procedural details of responding to an incident and keeping the business running, not the public relations panic that typically occurs after a major breach affecting your customers, brand perception, and security program image.

What if I told you that your data breach insurance won’t cover a cyberattack from China, Russia, or any others on the list of nation state offenders responsible for a large percentage of attacks today? Why? Because such attacks are considered acts of war, which are not covered by most insurance policies. Furthermore, there are even classes of attacks or outcomes, such as ransomware, that have been dropped from coverage.

What if you knew today that a serious breach would most likely lead to a string of public relations disasters, one after another, costing you millions, taking up 20 percent of the average IT staff day for two years—leading to 75-hour work weeks for many—and make it increasingly difficult to attract and retain customers and recruit new talent?

If it sounds exasperating, that’s because it is. But there are measures you can take now to prepare yourself for the two-year firehose that is a serious data breach.





Clearly, the next step is to have the drone attack. Why waste time telling everyone that they need to attack?

https://nationalinterest.org/blog/buzz/pentagon-fast-tracks-new-high-speed-attack-methods-war-191397

Pentagon Fast-Tracks New High-Speed Attack Methods to War

If a forward-operating drone suddenly recognized an entire mechanized column of enemy tanks emerging from wooded areas on the backside of a mountain, and the force was in a position to close in on allied ground positions ill-equipped to respond or counterattack, survival and potential victory in war would rest upon several key variables. One of these variables is speed. How fast could video images of the approaching tanks reach human decisionmakers in ground control centers? How quickly could the one-minute of video showing the emerging tanks be found from within hours and hours of drone video feeds? How can the tanks be identified and located in terms of movement, terrain, weapons or angle of approach? Can the newly arriving sensor information be processed and transmitted? Should the target detail reach other drones, nearby allied ground forces or even fighter jets in range to launch air attacks on the tanks? The answer to all of the above is “yes.” In order to keep forces alive and preserve an opportunity to prevail in war or even counterattack, processed information would need to reach the right places in position to respond immediately.

Instead of needing to rely solely upon point-to-point connectivity between a drone and a single ground-control station when it comes to receiving and processing actionable warfare intelligence, what if armored vehicles, ground artillery, fighter jets, or even dismounted forces in position to respond could be informed instantly? Perhaps they could receive targeting specifics, complete with threat details, navigational information, geographical specifics and data on a target’s speed of approach and anticipated attack point? Instead of slower, more segmented one-point to one-point information transmission, which is subject to significant latency concerns, what if all of the crucial detail needed to stop the attack could instantly be identified, analyzed and networked across an entire force?





Are we only worried about the government requesting expanded surveillance?

https://www.theverge.com/2021/8/9/22616381/apple-child-sexual-abuse-material-scanning-icloud-faq-pushback-privacy

Apple pushes back against child abuse scanning concerns in new FAQ

In a new FAQ, Apple has attempted to assuage concerns that its new anti-child abuse measures could be turned into surveillance tools by authoritarian governments. “Let us be clear, this technology is limited to detecting CSAM [child sexual abuse material] stored in iCloud and we will not accede to any government’s request to expand it,” the company writes.

Apple’s new tools, announced last Thursday, include two features designed to protect children. One, called “communication safety,” uses on-device machine learning to identify and blur [Find and alter data on your devices? Bob] sexually explicit images received by children in the Messages app, and can notify a parent if a child age 12 and younger decides to view or send such an image. The second is designed to detect known CSAM by scanning users’ images if they choose to upload them to iCloud. Apple is notified if CSAM is detected, and it will alert the authorities when it verifies such material exists. [By looking at / capturing the images? Bob]





Imagine what a return to the office will be like…

https://www.nbcnews.com/tech/tech-news/big-tech-call-center-workers-face-pressure-accept-home-surveillance-n1276227

Big Tech call center workers face pressure to accept home surveillance

Colombia-based call center workers who provide outsourced customer service to some of the nation’s largest companies are being pressured to sign a contract that lets their employer install cameras in their homes to monitor work performance, an NBC News investigation has found.





Is ‘ethical data’ possible?

https://www.niso.org/niso-io/2021/08/ethics-data-anonymity-vs-analytics

The Ethics of Data: Anonymity Vs Analytics

We are living in unprecedented times. We walk around with powerful computers in our pockets that can track our every move. We regularly offer up our location and vital information on what we buy, watch, and read to digital global powerhouses such as Facebook, Google, and Amazon.

This data is, of course, used to provide us with product and service suggestions designed to improve our lives. The technology now known as “big data” is a battleground for surveillance. Many feel we are living in a Big Brother world, where our every physical and online movement, purchase, and personal message is stored to create a picture of us that may or may not be accurate.

The age of big data is now firmly upon us, and we therefore face collective societal challenges on how our data is handled and used to target and track us. Data ethics is an emergent theme and one that poses complex questions for those of us who work in the identity and knowledge sector.

Luciano Floridi and Mariarosaria Taddeo, on behalf of the Turing Institute and the Oxford Internet Institute, defined data ethics in 2016 as “a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing and use), algorithms (including artificial intelligence, artificial agents, machine learning and robots) and corresponding practices (including responsible innovation, programming, hacking and professional codes).”





Perspective. My AI says not to worry, as long as I keep my litter box clean.

https://interestingengineering.com/technological-singularity-an-impending-intelligence-explosion

Technological Singularity: An Impending "Intelligence Explosion"

In this century, humanity is predicted to undergo a transformative experience, the likes of which have not been seen since we first began to speak, fashion tools, and plant crops. This experience goes by various names - "Intelligence Explosion," "Accelerando," "Technological Singularity" - but they all have one thing in common.

They all come down to the hypothesis that accelerating change, technological progress, and knowledge will radically change humanity. In its various forms, this theory cites concepts like the iterative nature of technology, advances in computing, and historical instances where major innovations led to explosive growth in human societies.

Many proponents believe that this "explosion" or "acceleration" will take place sometime during the 21st century. While the specifics are subject to debate, there is general consensus among proponents that it will come down to developments in the fields of computing and artificial intelligence (AI), robotics, nanotechnology, and biotechnology.

In part II, we will examine how advances in nanotechnology and medical technology are also leading us towards a point in time beyond which the future will be difficult to predict.

We will also take a look at how this predicted revolution will occur - a rapid onset, or gradually - and what the implications could be. Last, but not least, we'll look at what the critics and doubters have had to say about this, and how it stacks up to other predictions that never seem to come true.



No comments: