This could impact my students, so I may need to unleash my Ethical
Hackers!
Marshall
Zelinger reports:
RTD
[Regional Transportation District] customer credit card
information has been stolen with the use of a skimmer that the
transit company didn’t know about until recently.
Read
more on TheDenverChannel.
[From
the article:
On
Nov. 4, RTD discovered three skimmers on light rail ticket machines
at the Dry Creek Station, County Line Station near Park Meadows Mall
and the Mineral station near Aspen Grove shopping center.
At
the time, no customer information was stolen because whoever placed
the skimmers would need to pick them up to get the information.
On
Nov. 8, a light rail customer who bought a ticket at the Belleview
station a day earlier, called police when he spotted money missing
from his bank account.
…
"We did go back and look for video for a long period of time,
and were able to find on October 13, that there was a situation where
someone did install a skimmer that was not discovered immediately,"
said Reed.
Oh great! Lung cancer AND a computer virus!
Alex
Hern reports:
E-cigarettes may be better for your health than normal ones, but
spare a thought for your poor computer – electronic cigarettes have
become the latest vector for malicious software, according to online
reports.
Many e-cigarettes can be
charged over USB, either with a special cable, or by
plugging the cigarette itself directly into a USB port. That might
be a USB port plugged into a wall socket or the port on a computer –
but, if so, that means that a cheap e-cigarette from an untrustworthy
supplier gains physical access to a device.
Read
more on The
Guardian.
Continuing
yesterday's question: Do defense lawyers never ask about warrants or
subpoenas?
Dave
Maass writes:
The National Security Agency isn’t the only agency that’s willing
to flout the laws of the land in order to obtain your telephone
records. As we’re learning from a case out of New Mexico, local
prosecutors may be to willing to ignore rights enshrined in the
Constitution for an unfair advantage in criminal cases.
The case at hand involves the office of the District Attorney for the
Eight District of New Mexico, which covers three counties in Northern
New Mexico, including Taos. D.A. Donald Gallegos and one of his
subordinates are facing
disciplinary charges after they were caught issuing at least 91
bogus subpoenas to eight telephone companies for customer call
records.
Read
more on EFF.
See
also coverage on Albuquerque
Journal.
If
this works as advertised, everyone (in law enforcement) is going to
want one. It's like a digital fingerprint device for DNA.
Shane
Bauer reports that rapid-DNA technology makes it easier than ever to
grab and store your genetic profile. G-men, cops, and Homeland
Security can’t wait to see it everywhere. Read more on
MotherJones.
How
to gain loyalty? How to use it.
Loyalty
Program Leaders Leverage Data Analytics
Most
people have wallets loaded with loyalty program cards and/or
smartphones loaded with loyalty apps. Yet most companies are not
capitalizing on this trend, hints a study
from the International Institute for Analytics (IIA). Just 16
percent of companies surveyed by the IIA rated their loyalty programs
as highly effective.
…
The IIA study examined key loyalty program challenges experienced by
companies, as well as best practices of companies that viewed their
programs as "extremely effective."
The
top four challenges were:
- Offering rewards that customers value, cited by 45 percent of respondents
- Measuring program effectiveness, also mentioned by 45 percent
- Differentiating the program (42 percent)
- Coordinating the program across all points of customer contact (42 percent)
…
As marketing spend
on social channels increases, companies have yet to identify
metrics that help them determine the value of their spending,
Phillips said. "What is a like or a tweet worth? Marketers are
still looking for the kind of common currency that they use for
traditional channels like TV and print."
Loyalty
Program Best Practices
The
research also highlighted five characteristics that differentiate
highly effective loyalty programs from less effective ones:
- Dedicated customer loyalty function/department to manage the program
- Greater emphasis on customer experience as a key goal
- Rewards that are personalized for different customers
- Social media leveraged to manage customer relationships
- Data analytics valued and employed as a core program component
So
my student who used “SillyPsychoGirl” may have reformed? That
can't be bad.
Natasha
Singer reports:
Admissions officers at Morehouse College in Atlanta were shocked
several years ago when a number of high school seniors submitted
applications using email addresses containing provocative language.
Some of the addresses made sexual innuendos while others invoked
gangster rap songs or drug use, said Darryl D. Isom, Morehouse’s
director of admissions and recruitment.
But last year, he and his staff noticed a striking reversal: Nearly
every applicant to Morehouse, an all-male historically black college,
used his real name, or some variation, as his email address.
Read
more on NY
Times.
Simple
analytics for my Statistics class.
Global
Disease Monitoring and Forecasting with Wikipedia
Global
Disease Monitoring and Forecasting with Wikipedia by Nicholas
Generous, Geoffrey Fairchild, Alina Deshpande, Sara Y. Del Valle,
Reid Priedhorsky. Published: November 13, 2014.
“Infectious
disease is a leading threat to public health, economic stability, and
other key social structures. Efforts to mitigate these impacts
depend on accurate and timely monitoring to measure the risk and
progress of disease. Traditional, biologically-focused monitoring
techniques are accurate but costly and slow; in response, new
techniques based on social internet data, such as social media and
search queries, are emerging. These efforts are promising, but
important challenges in the areas of scientific peer review, breadth
of diseases and countries, and forecasting hamper their operational
usefulness. We examine a
freely available, open data source for this use: access logs from the
online encyclopedia Wikipedia. Using linear models,
language as a proxy for location, and a systematic yet simple article
selection procedure, we tested 14 location-disease combinations and
demonstrate that these data feasibly support an approach that
overcomes these challenges. Specifically,
our proof-of-concept yields models with up to 0.92, forecasting
value up to the 28 days tested, and several pairs of
models similar enough to suggest that transferring models from one
location to another without re-training is feasible. Based on these
preliminary results, we close with a research agenda designed to
overcome these challenges and produce a disease monitoring and
forecasting system that is significantly more effective, robust, and
globally comprehensive than the current state of the art.”
The
longer I follow this case, the more I think it is a sure loser. The
Copyright Cops seem desperate, and I wonder why they are getting so
much support from the government(s).
It’s
been nearly three years since Megaupload was taken down by the U.S.
authorities but it’s still uncertain whether Kim Dotcom and his
fellow defendants will be extradited overseas.
Two
months ago the U.S. Government launched a separate civil action in
which it asked the court to
forfeit the bank accounts, cars and other seized possessions of
the Megaupload defendants, claiming they were obtained through
copyright and money laundering crimes.
…
According to Megaupload’s lawyers the U.S. Department of Justice
(DoJ) is making up crimes that don’t
exist.
In
addition, Dotcom and his co-defendants claimed ownership of the
assets U.S. authorities are trying to get their hands on. A few days
ago the DoJ responded to these claims, arguing that they should be
struck from the record as Dotcom and his colleagues are fugitives.
In a
motion (pdf)
submitted to a Virginia District Court the U.S. asks for the claims
of the defendants to be disregarded based on the doctrine of fugitive
disentitlement.
…
Since Kim Dotcom and his New Zealand-based Megaupload colleagues are
actively fighting their extradition they should be seen as fugitives,
the DoJ concludes.
…
The recent DoJ filing also highlights another aspect of the case.
According to a declaration by special FBI agent Rodney Hays, the feds
have obtained “online conversations” of Julius Bencko and Sven
Echternach, the two defendants who currently reside in Europe.
These
conversations were obtained by law enforcement officers and show
that the authorities were ‘spying’ on some of the defendants
months after Megaupload was raided.
Interesting.
Useful?
Leanne
O’Donnell (@MsLods) has a helpful table on the status of data
retention in different countries. Her chart includes information on
the length of the retention period, what type of authorization is
required under their laws to access metadata, and the current status
of telecom retention requirements.
You
can access her chart here.
Sometimes
technology just leaps past me so fast I never even notice. I had to
go to Amazon and search for “selfie stick” to find out what they
were.
South
Korea is threatening to jail selfie stick retailers
The
South Korean government is going after sellers of uncertified camera
extenders, threatening fines of up to 30 million won ($27,000) and
prison time of as long as three years. According to Korea’s
Ministry of Science, “selfie sticks” that have bluetooth
functionality should be classified as frequency-emitting
communications equipment and go through rounds of testing before
being approved for commercial sale. On Thursday, the government
asked
citizens to help “root out” the
distribution of these unapproved bluetooth-equipped selfie sticks by
reporting on such sales. On Friday, authorities said they would
begin doing
checks on retailers.
The
government appears to be worried about the health effects of
electromagnetic radiation, also created by mobile phones, though at
low levels it is generally not
seen as harmful. Under Korea’s “Wireless
Telegraphy Act” all devices that give off electromagnetic waves
must be certified for national security and civilian use.
No comments:
Post a Comment