Is
this the future? School surveillance 24/7/365? No doubt they will
want the best technology, like facial recognition, etc.
https://www.ksl.com/article/50459109/davis-school-district-installs-districtwide-surveillance-system
Davis
School District installs districtwide surveillance system
The
Davis School District now has an around-the-clock monitoring center,
where it can keep eyes on cameras and conditions across 120
buildings.
… Someone
will be in the center 24 hours a day, every day of the year.
… Monitors
can shut down systems from here, even lock down buildings. It's
something Mott said that will continue to improve just in case one of
those worst-case scenarios ever happens here.
"We're
working to coordinate and work with schools on drills, whether they
be fire drills or lockdown drills, those kind of things, we're always
preparing and practicing," he said.
Two
kinds of fraud.
https://www.theregister.com/2022/08/16/social_engineering_cyber_crime_insurance/
PC
store told it can't claim full cyber-crime insurance after
social-engineering attack
A
Minnesota computer store suing its crime insurance provider has had
its case dismissed, with the courts saying it was a clear instance of
social engineering, a crime for which the insurer was only liable to
cover a fraction of total losses.
SJ
Computers alleged in a November
lawsuit [PDF]
that Travelers Casualty and Surety Co. owed it far more than paid on
a claim for nearly $600,000 in losses due to a successful business
email compromise (BEC)
attack.
… Travelers,
which filed a motion to dismiss, said SJ's
policy clearly delineated between computer fraud and social
engineering fraud.
The motion was granted
[PDF]
with prejudice last Friday.
Who
gets to define ‘reasonable?’
https://www.databreaches.net/us-regulator-urges-mfa-and-puts-banks-on-notice-not-reasonably-protecting-data-is-illegal/
US
regulator urges MFA and puts banks on notice – not reasonably
protecting data is illegal
Jim
Nash reports:
A
U.S. consumer finance regulator has published a circular warning that
insufficient security for consumer biometric and other personal data
is illegal under federal law. Multi-factor authentication is singled
out as a method of making data security sufficient.
Anyone
reading that who still thinks it will never happen to them is invited
to read on to find out about the tech company who just fell victim.
The
Consumer Financial Protection Bureau says
that
not protecting the data can be found to be an unfair practice under
12
U.S.C. 5536 for
financial institutions. Officials cite preventative practices that
can minimize risk.
Read
more at Biometric
Update.
(Related)
Should similar rules apply?
https://www.theverge.com/2022/8/17/23306570/period-tracking-apps-privacy?scrolla=5eb6d68b7fedc32c19ef33b4
Period
and pregnancy tracking apps have bad privacy protections, report
finds
Most
popular period and pregnancy tracking apps don’t have strong
privacy protections, according to a new analysis from researchers at
Mozilla. Leaky privacy policies in health apps are always a problem,
but issues that fall into this particular category are especially
concerning now that abortion is illegal in many places in the United
States.
Period
and pregnancy tracking apps collect data that could theoretically
be
used to prosecute people getting abortions in places where it’s
illegal. Data from period tracking apps isn’t the biggest thing
used to tie people to abortions right now — most
often,
the digital data used in those cases comes from texts, Google
searches, or Facebook messages. But they’re still potential risks.
Do
we have an acceptable answer?
https://venturebeat.com/ai/who-owns-dall-e-images-legal-ai-experts-weigh-in/
Who
owns DALL-E images? Legal AI experts weigh in
When
OpenAI announced
expanded
beta access to DALL-E in July, the company offered paid subscription
users full usage rights to reprint, sell and merchandise the images
they create with the powerful text-to-image generator.
A
week later, creative professionals across industries were already
buzzing with questions. Topping the list: Who
owns images put
out by DALL-E, or for that matter, other AI-powered text-to-image
generators, such as Google’s Imagen? The owner of the AI that
trains the model? Or the human that prompts the AI with words like
“red panda wearing a black leather jacket and riding a motorcycle,
in watercolor-style?”
What
if we decide that AI is not responsible for its actions?
https://www.economist.com/podcasts/2022/08/16/will-ai-achieve-consciousness
Will
AI achieve consciousness?
Our
podcast on science and technology. This week, we explore whether
artificial intelligence could become sentient—and the legal and
ethical implications if it did
A
DEBATE has been raging in technology circles, after an engineer at
Google claimed in June that the
company’s chatbot was
sentient. Host Kenneth Cukier explores how to define “sentience”
and whether it could be attained by AI. If machines can exhibit
consciousness,
it presents myriad ethical and legal considerations. Is society
equipped to deal with the implications of conscious AI?
Runtime:
44 min
Would
any ‘civilian’ vendor be able to stop military applications?
https://www.theregister.com/2022/08/17/russia_weaponizes_chinese_drones_robots/
Russian
military uses Chinese drones and bots in combat, over manufacturers'
protests
Russia's
military has praised civilian grade Chinese-made drones and robots
for having performed well on the battlefield, leading their
manufacturers to point out the equipment is not intended or sold for
military purposes.
When
a video of a robot camera dog showed up with a grenade launcher on
Russian state-sponsored media RIA Novosti this week, many immediately
recognized it as Chinese Unitree Robotics' $2,700 Go1 robotic dog –
albeit dressed in a sort of canine ninja suit.
Always
good to know the players. Also points to some resources.
https://www.techspot.com/article/2515-surveillance-intelligence-alliances/
A
Surveillance Primer: 5 Eyes, 9 Eyes, 14 Eyes
… In
2021, the US Federal Trade Commission published a 74
page report documenting
how internet service providers are collecting vast amounts of private
data from their customers and then selling the data to third parties.
We examined
this report,
the implications, and some solutions in our article on internet
service providers logging browsing activity.
These
practices are well-documented in the PRISM
surveillance documents and
also the infamous Room
641a example with
AT&T and the NSA. Fortunately, there are some simple solutions
to keep your data safe that we'll cover below. In this guide, we'll
explain all the different "X" eyes surveillance alliances
and why this topic is important when choosing privacy tools.