Oh sure. Now that the Privacy
Foundation has broken the ice, all kinds of “Privacy Advocate
wanna-bes” are following in our footsteps. I can't wait to examine
the video my drone took to see how many of our panalists ideas they
ripped off!
Lawmakers
mull restrictions on domestic drones
October 25, 2012 by Dissent
Brendan Sasso reports:
House Judiciary
Committee lawmakers discussed legislation to restrict the use of
drones in domestic airspace during a field forum at Rice University
in Texas on Thursday.
Rep. Ted Poe
(R-Texas), who chaired the forum of the Subcommittee on Crime, urged
Congress to take up his Preserving American Privacy Act, which would
only allow police to use drones with a warrant and to investigate a
felony.
Read more on The
Hill.
(Related) Escalation! Arms Race!
(Drones with ping pong paddles?) What's next? Paint balls to mark
evil doers? (Bank robbers, illegal boarder crossers, j-walkers) We
are slipping down that slope.
Drop
Ping-Pong Balls on People With This iPhone-Controlled Copter
Here at Wired we’re big fans of
office
weaponry. And drones. So when we learned of the Kickstarter
for the iStrike Shuttle, for the iStrike Shuttle, an
iOS-controlled flying machine that can drop ping-pong balls onto your
target of choice, we got pretty excited.
(Related) This is just a walking
drone...
Watch
this DARPA robot climb, leap, and walk past obstacles
Of course they do! Part of the
“Ubiquitous Surveillance” paln. Let's hope it's not the same
engineers NASA used on the Mars lander that confused Meters and
Feet...
U.S.
looks to replace human surveillance with computers
… The U.S. government has funded
the development of so-called automatic video surveillance technology
by a pair of Carnegie Mellon University researchers who disclosed
details about their work this week -- including that it has an
ultimate goal of predicting what people will do in the future.
… Their Army-funded research,
Oltramari and Lebiere claim, can go further than merely recognizing
whether any illicit activities are currently taking place. It will,
they say, be capable of "eventually predicting" what's
going to happen next. [Very like “Minority Report”
but without the psychics Bob]
Not a lot of coast in Colorado, but we
do have Coast Guard. (Including the crypto weenies at Buckley)
Coast
Guard Boardings and Your Fourth Amendment Rights, Part 1
October 26, 2012 by Dissent
FourthAmendment.com
points us to an article by Clark Beek that begins:
Sorry, but when it
comes to Coast Guard boardings, you don’t have any rights.
I’m surprised
how many boaters don’t know this. The US Coast Guard can board
your boat any time they want, and look anywhere they want, without
probable cause or a warrant. They can do this on the open sea, or
while you’re asleep aboard in your marina at midnight. They can
look through your bedsheets, in your lockers, in your bilges, in your
jewelry box, or in your pockets. They can do it carrying just their
sidearms, or they can do it carrying assault rifles. They can be
polite about it or they can be rude, but mostly they’re polite.
Read more on SailFeed.
The article really was an eye-opener for me. I’m filing this in
my “I didn’t know that” file and looking forward to Part 2 of
the article.
For my Ethical Hackers: Ride free!
Drive E-470 toll-free!
How much do you know about RFID chips?
Do you know how many you’re carrying at any given moment? Do you
know what information is stored on them? Do you know how close a
hacker needs to get to you in order to steal that information? Have
you considered any form of RFID protection? And most importantly, do
you know what RFID protection will be effective?
These days, RFID chips are present in
all sorts of items, such as credit cards, library books, grocery
goods, security tags, implanted pet details, implanted medical
records, passports and more. Some schools now require their students
wear RFID tags. The amount of information which could be learned
about you from your RFID chips is quite a lot! Plus, you never know
what those information thieves are planning on doing with your
information, either. So, it’s best to understand the risks of RFID
hacking and limit your exposure to harm. Here’s the basics of what
you need to know.
Also for my Ethical Hackers. Tap both
ends of the conversation easily. There's an App (Okay, a web
service) for that!
If you follow two celebrities on
Twitter and want to check out the conversations that have taken place
between them, you might have to alternate between their streams and
look for handles in their tweets. Here to make matters simpler is a
web service called Conweets.
Similar tools: TweetsBetween
and Bettween.
A recap, with sage advice...
Class
Actions Adding to the Cost of Data Breaches
Big data yields big data breaches, and
potentially produces large class sizes, making such lawsuits
attractive to plaintiffs’ lawyers. Companies that store or process
personal information face an increasing risk of class action lawsuits
based not only on the company’s use of that information, but also
on the theft or misuse of that personal information due to data
breach. Many states, such as California and Delaware, which have
liberal data breach laws that allow private rights of action for
security incidents regardless of a likelihood of injury, have
facilitated class action lawsuits. In one such case, plaintiffs
sought damages of $5,000 per customer from the defendant, which could
have resulted in possible damages totaling in the tens of billions of
dollars – far more than the defendant company was worth. A
recent survey of data breach litigation found that the average
settlement award in these cases was approximately $2,500 per
plaintiff, with mean attorneys’ fees reaching $1.2 million.1
Conclusion
The likelihood of a data breach or
privacy issue occurring in any business has become a virtual
certainty. Class action lawsuits stemming from such incidents have
upped the ante with the potential of millions of dollars of
attorneys’ fees if not damage recoveries. All companies would be
prudent to increase their risk mitigation efforts to beef up
administrative, technical, and physical security to prevent data
breaches coupled with enforcing security and privacy policies and
procedures and strengthened indemnification provisions with third
parties who have access to a company’s data.
An interesting editorial on Open Access
published in an Open Access Journal.
October 25, 2012
Editorial
- Delivering on a Network-Enabled Literature
Neylon C (2012) More
Than Just Access: Delivering on a Network-Enabled Literature.
PLoS Biol 10(10): e1001417. doi:10.1371/journal.pbio.1001417
- "By any measure it has been a huge year for the open-access movement. At the beginning of the year, it looked possible that the public access policy of the US National Institutes of Health (NIH) might be rolled back by the Research Works Act, a legislative attempt supported by Elsevier and the Association of American Publishers to make such policies illegal. But as we move towards year's end, the momentum behind open access looks unstoppable with the announcement of major policy initiatives in the United States, the European Union, Denmark, and the United Kingdom. Nevertheless, there is still much to be done and the challenges remain large, but the remaining questions are largely ones of implementation, not principle."
Part of the Economic history of the
world. This is how money worked (until we dropped the gold standard)
October 25, 2012
Center
for Financial Stability Publishes The Bretton Woods Transcripts
Kurt
Schuler: "The transcripts of the Bretton Woods conference
were never meant to be published, but we have them. Today the CFS
releases The Bretton Woods Transcripts, an e-book edited by me and
Andrew Rosenberg. It contains verbatim proceedings of many meetings
from the 1944 Bretton Woods conference, which established the IMF and
World Bank and began an era of international economic cooperation
that endures today. The Web
page for the book contains much more information about it, plus
extensive background material that is being made readily available
for the first time. Over the next few weeks I will comment here on
elements of the book, and offer some details about the conference and
its participants that are not in the book."
- Related postings on the financial system
Just a comment. The US strategy is to
treat any use of Weapons of Mass Destruction equally, meaning if
Syria uses chemical weapons, we could nuke Damascus.
Exclusive:
U.S. Rushes to Stop Syria from Expanding Chemical Weapon Stockpile
The regime of embattled Syrian dictator
Bashar Assad is actively working to enlarge its arsenal of chemical
weapons, U.S. officials tell Danger Room. Assad’s operatives have
tried repeatedly in recent months to buy up the precursor chemicals
for deadly nerve agents like sarin, even as his country plunges
further and further into a civil war. The U.S. and its allies have
been able to block many of these sales. But that still leaves
Assad’s scientists with hundreds of metric tons of dangerous
chemicals that could be turned into some of the world’s most
gruesome weapons.
Interesting.
Amidst
STEM Education Hype, NoRedInk Is On A Mission To Fix America’s
Grammar Problem
… With STEM education reform now
being touted as
the key to America’s economic future, it’s easy to forget the
other side. One
recent national study, for example, found that only “one
quarter of eighth and 12th graders are proficient in writing.” On
top of that, College
Board reported that reading and writing scores on the SAT hit
record lows in the U.S. last year.
It’s this not-so-pretty picture of
humanities education in the U.S. that led Jeff Scheur, a high school
english teacher in Chicago, to create NoRedInk
— an adaptive learning tool that aims to help students (and you)
improve their writing and grammar skills. To help get students
engaged, the startup works to personalize the learning process by
generating custom curricula for students based on their interests,
adapting feedback, tutorials and coaching to their particular
abilities and allowing them to view problem areas in color-coded heat
maps.
… Rather than casting a broad net,
the startup’s lessons focus on what students are getting wrong,
while offering them the opportunity to watch tutorials when they get
stuck. NoRedInk eschews multiple choice (really, the enemy of
writing), instead prompting students to input the correct answer
themselves or drag-and-drop the right punctuation mark, for example.
As they progress through lessons, students and teachers can track
progress in NoRedInk’s dashboard, which is broken down into skill
areas (and lets students view their analytics heat map-style).
… And so far, it seems to be
working. With no marketing, NoRedInk has managed
penetration into four percent of schools in the U.S., was
one of the three winners
of Citi and NBC’s Innovation Challenge and was accepted into
Imagine K12′s current batch of startups. (Which launch at the
accelerator’s Demo Day on Friday, October 26th.)
Today, the startup has 70,000 users and
teachers and students have completed 3.5 million questions — two
million of which were in the past month. Over 300 schools have
applied to participate in “NoRedInk
Premium,” a paid, suped-up version of the service built
specifically for schools that launches this winter.
As the service is free
for everyone else, the premium offering represents NoRedInk’s play
at creating an up-selling opportunity (and business model, really),
hooking teachers and students with the basics for free and charging
schools if they want to integrate the service school-wide.
No comments:
Post a Comment