Russian Police Make First Official Arrest Of A Robot And
Skynet Is Not Pleased
Is it possible to arrest a robot? Do robot’s even have the ability to make
unlawful decisions? Philosophy aside,
Russian police just made the first robot arrest in Moscow at a political rally.
The “Promobot” was arrested at a rally for Russian
parliament candidate Valery Kalachev, but it is currently unclear why the robot
was detained. The Moscow police have not
released an official reason for the arrest, however, local Russian media
sources claim that the robot was “recording voters" opinions on [a]
variety of topics for further processing and analysis by the candidate's team”.
A Promobot representative hypothesized
that the robot was detained because “perhaps this action wasn't authorized”.
A Promobot representative stated, “Police asked to remove
the robot away from the crowded area, and even tried
to handcuff him.” The
representative noted that the Promobot did not “put up any resistance”.
Something my students will
discuss.
Corporate Judgment Call: When to Disclose You’ve Been Hacked
Companies are getting hacked more frequently but aren’t
disclosing the incidents in their regulatory filings, a trend that worries
investors.
Just 95 of the nation’s roughly 9,000 publicly listed
companies have informed the Securities and Exchange Commission of a data breach
since January 2010, according to an analysis of their filings by Audit
Analytics.
Yet, the number of breaches or hacks across all U.S.
businesses—public and private—totaled 2,642 during the same period, according
to the Privacy Rights Clearinghouse, an advocacy group.
The reason many data breaches aren’t reported to the SEC,
say chief financial officers, is that the damage isn’t “material,” meaning it
isn’t significant enough to influence an investor’s decision to buy a company’s
stock.
Local. A specific
need or just “everyone else is doing it!?”
Denver police spent $30K on social media surveillance tools
in May
In May, Denver police spent at least $30,000 on
surveillance software designed to monitor and collect social media posts across
at least a dozen networks, according to police records.
Documents acquired by Daily Dot under the Colorado Open
Records Act include an invoice to the Denver Police Department from Geofeedia,
Inc., a startup whose location-based surveillance wares are exhibited at
national security and law enforcement summits across the country.
… With Geofeedia,
Denver police have acquired the ability to simultaneously monitor posts on Facebook, Twitter, YouTube, Instagram, Vine, Periscope, and Flickr, among others. Its location-based search capabilities enable
police to vacuum up nearly every social media post emanating from within
specified geographical boundaries. The
tweets, photos, videos, and live broadcasts of anyone identified by the
software within the area are intercepted and recorded by police through a
process developers call “geo-fencing.”
… Tools like
Geofeedia offer police the ability to conduct real-time social media
surveillance during mass shootings or terrorism events. They are also capable of sucking up copious
amounts of data about criminals and innocents alike, information which can then
be stored by authorities for later use.
… In the past,
police departments have defended the use of such software, promoting in
particular its ability to identify eyewitnesses to crimes who might have
otherwise never come forward. It may
also be used to locate guns in schools or identify the sources of illegal drug
activity.
How much is too much, how much is too little?
Smartphone alert during NY manhunt draws criticism
Interesting. This
could only happen in New York or New Jersey? "Leave the gun. Take the cannoli." Is a
Godfather quote.
Thieves Helped Crack the Chelsea Bombing Case, Sources Say
Leave the bomb, take the bag.
In two separate cases, thieves snatching bags from city
streets and train stations inadvertently helped law enforcement get the upper
hand in an ongoing bomb spree that's hurt dozens of people and spans both sides
of the Hudson River, sources said.
… two thieves
accidentally helped to disable his second pressure cooker bomb left inside a
rolling suitcase on West 27th Street, sources said.
The young men, who sources described as being well-dressed,
opened the bag and took the bomb out, sources said, before placing the
explosive into a garbage bag and walking away with the rolling suitcase.
… Investigators believe they
inadvertently disabled the explosive, sources said.
… Then, on Sunday
night, two homeless men snatched a backpack resting atop a trash can near a
train station in Elizabeth, N.J., officials said.
“They probably thought there was something of value in
that backpack,” said the mayor of Elizabeth, Christian Bollwage.
They started rooting through the bag and found five
explosives that officials say are tied to Rahami, prompting them to immediately
drop the bag in the middle of the street and alert police, officials said.
"When they opened it up and found the wire and the
pipe they immediately walked
around the other corner to Elizabeth police headquarters and turned it
in," Bollwage said. [So they knew the cops were just around the
corner? Bob]
Best Practices.
Simple enough?
1. Make regular backups.
2. Keep your computer updated.
3. Spot suspicious files, enable
file extensions.
4. Use mail filtering.
5. Employ an internet security
suite.
For my IT Governance class.
Catalin Cimpanu reports:
A recent brute-force scan of FTP
servers available online via an IPv4 address revealed that 796,578 boxes can be
accessed without the need for any credentials.
The perpetrator of this scan is a
security researcher that goes by the name of Minxomat, owner of a
cyber-security firm that performs these types of scans on a regular basis, but
usually in a much more targeted manner and for the purpose of detecting
malicious traffic and its sources.
Read more on Softpedia.
(Related)
The CFO Imperative: Managing Risks Arising from Technology
… The issue is
this: Data that could warn about potential risks are usually scattered across
different departments in a company. Without
the right tools and structure to bring those data points together, companies
are hampered in how well they manage risk. Another challenge is that in many companies,
there is no consensus on the appetite for risk. “At the very least, you need to have a
discussion about the risks,” Ittner says. “Risks aren’t standalone, so they need to
consider their interdependencies and get the cross-functional discussion
going.” Without adequate risk
protection, the inevitable reaction to a breach is immediate crisis management.
But usually, such short-term actions
distract from planning for longer-term growth.
Another really good ‘bad example’ for my Governance
class. How do you make certain that what
is supposed to happen, happens?
Flaws in Fingerprint Records Allowed Hundreds to Become U.S.
Citizens
The Department of
Homeland Security granted citizenship to hundreds of people who had
previously been ordered deported or removed under different names because of
flaws in keeping fingerprint records, according to a report released Monday.
The report from
the department’s Office of Inspector General found that nearly 900 individuals
were granted citizenship because neither the agency nor the F.B.I. databases
contained all of the fingerprint records of people who had previously been
ordered to be deported.
Nearly 150,000 older fingerprint records were not
digitized or simply were not included in the Department of Homeland Security’s
databases when they were being developed, the report said. In other cases, fingerprints that were taken
by immigration officials during the deportation process were not forwarded to
the F.B.I.
Virtual money is real money!
Bitcoin Is Real Money, Judge Rules in J.P. Morgan Hack
… U.S. District
Judge Alison Nathan in Manhattan rejected a bid by Anthony Murgio to dismiss
two charges related to his alleged operation of Coin.mx, which prosecutors have
called an unlicensed bitcoin exchange.
Murgio had argued that bitcoin did not qualify as “funds”
under the federal law prohibiting the operation of unlicensed money
transmitting businesses.
But the judge, like her colleague Jed Rakoff in an
unrelated 2014 case, said the virtual currency met that definition
… The case is U.S.
v. Murgio et. al., U.S. District Court, Southern
District of New York, No. 15-cr-00769.
Perspective. People
seem to like these services, almost as much as investors.
Uber rival Grab raises $750M led by SoftBank at a $3B
valuation
… Grab said it
400,000 drivers on its platforms and it has seen over 21 million app downloads
to date. In an announcement, the company
added that it sees “up to 1.5 million daily bookings,” which a Grab
spokesperson confirmed means ride requests not completed rides. Uber doesn’t provide business data for
Southeast Asia so it is hard to compare them, but we previously reported that Uber is operationally profitable in
parts of Southeast Asia and there seems to be little to choose between the
two.
Someday I’m gonna get me some culture!
The Museum of Modern Art’s Miraculous New Online Archive
… This archive,
available for free on the Museum of Modern Art’s website, now documents every show
that it has exhibited, going back to its very first in 1929.
… The photos are
almost all spare and without people. They seem to have been captured for
documentary purposes, not expressive ones.
No comments:
Post a Comment