Push,
push, push... Let's hope everyone knows (and plays by) the rules of
this game.
China
scrambles jets in air zone to monitor US and Japanese planes
The zone covers
territory claimed by China, Japan, Taiwan and South Korea.
China said last week
that all aircraft crossing through the zone must file flight plans
and identify themselves or face "defensive emergency measures".
The US, Japan and South
Korea say they have since defied the ruling and flown military
aircraft in the area.
The air defence identification zone (ADIZ) covers a vast area of the
East China Sea, including a group of islands claimed by Japan, China
and Taiwan.
South Korea claims a
submerged rock, known as Ieodo, also within the zone.
Now this
is interesting. Did GfK develop the “surveillance router” or is
it a Google tool? If it involves a ”hands on” delivery, my
Ethical Hackers probably can't spoof a few thousand survey
participants. How skewed will this be if they only survey the
“Privacy ignorant?”
Joe Cadillic sent me a
link to an article on Testosterone Pit that begins:
The
first thing I noticed after I’d removed the glossy brochure and a
letter from the 8.5 x 11 envelope was the crisp $5 bill attached to
the letter. I’m a sucker for free money. [Ditto Bob]
After peeling it off and securing it in my pocket, I started reading.
It was addressed to “Dear current resident of …,” followed by
my address. The five bucks was “our way of thanking you for
considering participation,” the letter said. Participation in
what?
“An
exciting and very important new research study conducted for Google
by GfK,” it said. It sounded harmless. The proposition? My
involvement in “Screenwise” would help Google understand how I
“use different types of media” and improve its “products and
services.” In return, I’d get some money. How much wasn’t
exactly clear up front due to the different steps and conditions.
So, sucker for free money, I read on.
I
would also get a “free top-of-the-line wireless Cisco router,” it
said. Ha, I already have one of those, but this router would be
special. It would collect all data flowing through it and send it to
Google and GfK. A spy router!
Read more about it on
Testosterone
Pit while I go mutter to myself. I doubt any of my readers would
sign up for the offer they describe, but it’s hard to believe it’s
even for real….
[From
the article:
Google would in effect
sit inside the router and know everything – where you bank, the
brokers you use, how often you visit their sites, what trading
software you use, your internet phone calls, Skype conversations,
instant messages, email, what health issues you might be dealing
with, the porn sites you or your kids visit, where you’d like go to
dinner. Everything.
(Related) Prescription
surveillance tools? Install the “Safe Living” app or we'll raise
your health insurance rates?
Kate Andries reports:
Your
phone knows everything about you — how much you walk, talk and
what level of Candy Crush you’re stuck on — but soon it could be
spilling secrets to your doctor.
More
and more physicians are prescribing apps that help track their
patients’ illnesses through information collected by their
smartphones.
“[The
trend] just seems to be exploding,” said Seth S. Martin, a Pollin
cardiovascular prevention fellow at Johns Hopkins Hospit al in
Baltimore. “With the widespread use now of smartphones, it’s a
really exciting opportunity to help people live healthier lives.”
[“...until research tells us we've been suggesting
the wrong things.” Bob]
Read more on WTOP.
The news story discusses accuracy and validity of apps, but I see no
discussion of data security and whether such data might be
intercepted or shared elsewhere – and with what consequences.
Contrast this with the
UN and EU insistence on Privacy (both published this week)
Mass
Surveillance of Personal Data by EU Member States and Its
Compatibility with EU Law
by Sabrina
I. Pacifici on November 29, 2013
Bigo, Didier and
Carrera, Sergio and Hernanz, Nicholas and Jeandesboz, Julien and
Parkin, Joanna and Ragazzi, Francesco Rossi and Scherrer, Amandine,
Mass Surveillance of Personal Data by EU Member States and Its
Compatibility with EU Law (November 6, 2013). Liberty and Security in
Europe Papers No. 61. Available
at SSRN.
“In the wake of the
disclosures surrounding PRISM and other US
surveillance programmes, this paper assesses the large-scale
surveillance practices by a selection of EU member states: the UK,
Sweden, France, Germany and the Netherlands. Given the large-scale
nature of these practices, which represent a reconfiguration of
traditional intelligence gathering, [Why would they think
that? Bob] the paper contends that an analysis of European
surveillance programmes cannot be reduced to a question of the
balance between data protection versus national security, but has
to be framed in terms of collective freedoms and democracy. It finds
that four of the five EU member states selected for in-depth
examination are engaging in some form of large-scale interception and
surveillance of communication data, and identifies parallels and
discrepancies between these programmes and the NSA-run operations.
The paper argues that these programmes do not stand outside the realm
of EU intervention but can be analysed from an EU law perspective via
i) an understanding of national security in a democratic rule of law
framework where fundamental human rights and judicial oversight
constitute key norms; ii) the risks posed to the internal security of
the Union as a whole as well as the privacy of EU citizens as data
owners and iii) the potential spillover into the activities and
responsibilities of EU agencies. The paper then presents a set of
policy recommendations to the European Parliament.”
They use
drones to smuggle drugs into the US, why not keep their friends
supplied while they serve their terms? Perhaps they should put more
emphasis on “Remote” piloting?
Drones
used to try to smuggle contraband into jail
… Prison guards at
the Calhoun state jail spotted a drone hovering over the prison yard
and alerted police who began a search of the local area.
Inside a nearby car
they found a six-rotor remote-controlled helicopter, between 1lb and
2lb of tobacco and several mobile phones.
Four people were
arrested and could face up to 20 years in prison if found guilty of
attempting to smuggle contraband into the prison.
The
problem is keeping a lid on software that works and that people like.
Ties into employees installing software on their employer's machines
or their BYOD devices.
US
agrees to pay $50m after 'piracy' of software
Apptricity, based in
Texas, has provided logistics programs to the army since 2004.
The company said it had
discovered
last year the software had been installed on
many more machines than had been licensed.
… According to
court documents filed in 2012, the deal with the military meant up to
500 named users could access the software.
Apptricity later
estimated that 9,000 users were accessing the program, in addition to
the 500 that had been paid for.
The unauthorised
copying only came to light after a US Army official mentioned
"thousands" of devices running the software during a
presentation on technology.
Oh, boo
hoo! When you are found guilty of monopolistic practices, expect
your watcher to charge monopolistic rates. That's the point, isn't
it?
Our
ebook antitrust watchdog is too expensive, moans Apple
Apple has filed a court
motion complaining that Michael Bromwich, the court-appointed
antitrust regulator appointed to oversee the fruity firm in the wake
of its ebook price-fixing shenanigans, is too charging too much for
his services.
"Mr Bromwich
appears to be simply taking advantage of the fact that there is no
competition here or, in his view, any ability on the part of
Apple, the subject of his authority, to push back on his demands,"
said Cupertino's lawyers in a filing to the New York federal court,
Bloomberg reports.
On the face of it Apple
may have a point. In his first two weeks in the job, Bromwich has
invoiced Apple for $138,432 for his services, including a 15 per cent
surcharge because he's assigned the role to his consultancy business,
rather than as part of his day job at law firm Goodwin Procter.
… Bromwich is
charging an hourly rate of $1,100, which the Apple filing says is
more than it has ever been billed by a lawyer before. [But he's
charging as a consultant. Bob]
… Based on
Bromwich's first two weeks of invoicing, that five year appointment
could cost Apple over $16m in fees, although it may be that the
lawyer has been front-loading the early invoices to pay for costs of
setting up a regulator position. Apple's 2013 net income was $37
billion.
My
statistics students will recognize this – they had better recognize
this!
… First, start with
something that interests, even bothers, you at work, like
consistently late-starting meetings. Whatever it is, form it up as a
question and write it down: “Meetings always seem to start late.
Is that really true?” [Your hypothesis Bob]
Next, think through the
data that can help answer your question, and develop a plan for
creating them. Write down all the relevant definitions and your
protocol for collecting the data. For this particular example, you
have to define when the meeting actually begins. Is it the time
someone says, “Ok, let’s begin.”? Or the time the real
business of the meeting starts? Does kibitzing count?
Now collect the data.
It is critical that you trust
the data. And, as you go, you’re almost certain to find gaps
in data collection. You may find that even though a meeting has
started, it starts anew when a more senior person joins in. Modify
your definition and protocol as you go along.
Sooner than you think,
you’ll be ready to start drawing some pictures. [...or even
apply some simple math! Bob]
No comments:
Post a Comment