Saturday, February 06, 2021

Something to consider for home WiFi security? Not without risks.

https://www.muo.com/tag/hide-wifi-network-prevent-detected/

How to Hide Your Wi-Fi Network: Everything You Need to Know





More on how everyday surveillance is being used. We probably don’t even need the stuff from three letter agencies.

https://www.nytimes.com/2021/02/05/opinion/capitol-attack-cellphone-data.html

They Stormed the Capitol. Their Apps Tracked Them.

Times Opinion was able to identify individuals from a trove of leaked smartphone location data.

A source has provided another data set, this time following the smartphones of thousands of Trump supporters, rioters and passers-by in Washington, D.C., on January 6, as Donald Trump’s political rally turned into a violent insurrection. At least five people died because of the riot at the Capitol. Key to bringing the mob to justice has been the event’s digital detritus: location data, geotagged photos, facial recognition, surveillance cameras and crowdsourcing.

While there were no names or phone numbers in the data, we were once again able to connect dozens of devices to their owners, tying anonymous locations back to names, home addresses, social networks and phone numbers of people in attendance. In one instance, three members of a single family were tracked in the data.

There is an argument to be made that this data could be properly used by law enforcement through courts, warrants and subpoenas. We used it ourselves as a journalistic tool to bring you this article. But to think that the information will be used against individuals only if they’ve broken the law is naïve; such data is collected and remains vulnerable to use and abuse whether people gather in support of an insurrection or they justly protest police violence, as happened in cities across America last summer.





So, is there an answer?

https://www.technologyreview.com/2021/02/05/1017560/predictive-policing-racist-algorithmic-bias-data-crime-predpol/

Predictive policing is still racist—whatever data it uses

Training algorithms on crime reports from victims rather than arrest data is said to make predictive tools less biased. It doesn’t look like it does.

many developers of predictive policing tools say that they have started using victim reports to get a more accurate picture of crime rates in different neighborhoods. In theory, victim reports should be less biased because they aren’t affected by police prejudice or feedback loops.

But Nil-Jana Akpinar and Alexandra Chouldechova at Carnegie Mellon University show that the view provided by victim reports is also skewed.





Change, the final frontier.

https://hbr.org/2021/02/why-is-it-so-hard-to-become-a-data-driven-company

Why Is It So Hard to Become a Data-Driven Company?

For the third consecutive year, investment in data and AI initiatives has been nearly universal, with 99.0% of firms reporting investment in data and AI according to findings from a newly released executive survey from NewVantage Partners, a strategic advisory firm that I founded in 2001 to advise Fortune 1000 companies on data leadership issues. But this year, despite growing investment, it appears most companies are struggling to maintain momentum.

After nearly a decade after of performing this survey, we’ve noted two significant trends. First, mainstream companies have steadily invested in Big Data and AI initiatives in efforts to become more data-driven: 91.9% of firms report that the pace of investment in these projects is accelerating, and 62.0% of firms reporting data and AI investments of greater than $50 million. Second, findings from this year’s survey suggest that even with record levels of committed investment, firms are continuing to struggle to derive value from their Big Data and AI investments and to become data-driven organizations. Often saddled with legacy data environments, business processes, skill sets, and traditional cultures that can be reluctant to change, mainstream companies appear to be confronting greater challenges as demands increase, data volumes grow, and companies seek to mature their data capabilities.

What’s at the root of this slow progress? For the fifth consecutive year, executives report that cultural challenges — not technological ones — represent the biggest impediment around data initiatives. In the 2021 survey, 92.2% of mainstream companies report that they continue to struggle with cultural challenges relating to organizational alignment, business processes, change management, communication, people skill sets, and resistance or lack of understanding to enable change.





The odds are eight to five against Trump moving to Nevada.

https://apnews.com/article/legislature-legislation-local-governments-nevada-economy-2fa79128a7bf41073c1e9102e8a0e5f0

Nevada bill would allow tech companies to create governments

Planned legislation to establish new business areas in Nevada would allow technology companies to effectively form separate local governments.

Democratic Gov. Steve Sisolak announced a plan to launch so-called Innovation Zones in Nevada to jumpstart the state’s economy by attracting technology firms, Las Vegas Review-Journal reported Wednesday.

Zone requirements would include applicants owning at least 78 square miles (202 square kilometers) of undeveloped, uninhabited land within a single county but separate from any city, town or tax increment area. Companies would have at least $250 million and plans to invest an additional $1 billion in their zones over 10 years.

The zones would initially operate with the oversight of their location counties, but would eventually take over county duties and become independent governmental bodies.



Friday, February 05, 2021

For training employees?

https://www.databreaches.net/the-national-cyber-investigative-joint-task-force-releases-ransomware-fact-sheet/

The National Cyber Investigative Joint Task Force Releases Ransomware Fact Sheet

The joint-seal product can be found at https://www.ic3.gov/Content/PDF/Ransomware_Fact_Sheet.pdf.





Also for training.

https://www.schneier.com/blog/archives/2021/02/presidential-cybersecurity-and-pelotons.html

Presidential Cybersecurity and Pelotons

President Biden wants his Peloton in the White House. For those who have missed the hype, it’s an Internet-connected stationary bicycle. It has a screen, a camera, and a microphone. You can take live classes online, work out with your friends, or join the exercise social network. And all of that is a security risk, especially if you are the president of the United States.





From left field?

https://iapp.org/news/a/virginia-consumer-data-protection-act-on-the-horizon-now-what/

Virginia Consumer Data Protection Act on the horizon — Now what?

And just like that, Virginia is on track to be the next U.S. state with comprehensive privacy legislation. For all the close calls other state legislatures have had on privacy bills in recent years, it took the Virginia General Assembly three weeks to introduce and debate the Consumer Data Protection Act to the edge of passage.

Senate Bill 1392 unanimously passed its first and second readings by the Virginia Senate with 39-0 votes on Feb. 3 and 4. Those votes follow an 89-9 vote on Jan. 29 from the House of Delegates to approve SB1392's companion bill, House Bill 2307. According to DLA Piper Partner Jim Halpert, the final Senate approval of SB1392 could come following a third reading Feb. 5, at which point the bill would head for a reconciliation between the Senate and House before enactment. If the law is indeed enacted, the bill could be signed into law by the governor at the end of February.





Face facts!

https://www.technologyreview.com/2021/02/05/1017388/ai-deep-learning-facial-recognition-data-history/

This is how we lost control of our faces

In 1964, mathematician and computer scientist Woodrow Bledsoe first attempted the task of matching suspects’ faces to mugshots. He measured out the distances between different facial features in printed photographs and fed them into a computer program. His rudimentary successes would set off decades of research into teaching machines to recognize human faces.

Now a new study shows just how much this enterprise has eroded our privacy. It hasn’t just fueled an increasingly powerful tool of surveillance. The latest generation of deep-learning-based facial recognition has completely disrupted our norms of consent.





Perhaps GDPR is not omnipotent?

https://www.pogowasright.org/us-publisher-not-within-gdpr-scope-despite-european-readership/

US publisher not within GDPR scope despite European readership

Pinsent Masons writes:

A US-registered publisher will not have to defend claims that its processing of a British resident’s personal data breached EU data protection laws after the High Court in London ruled that the laws do not apply to it.
The court reached that verdict despite it recognising that the US publisher had a “not minimal” number of UK readers; a fact the High Court said was “of no more than marginal relevance” to the question of whether its activities fell subject to the EU’s General Data Protection Regulation (GDPR).
[…]
The court was considering the territorial scope of the GDPR when determining whether Walter Soriano could proceed with data protection claims he had raised against Forensic News LLC, five journalists and a blogger in a trial before the London court.

Read more on Out-Law News. The ruling in the Soriano case can be found here.





Was this not obvious?

https://www.zdnet.com/article/ai-drives-the-evolution-of-technology-and-data-governance/

AI drives the evolution of technology and data governance

Key points focusing on how AI drives the evolution of technology and data governance and how an increase in customer demand and regulatory activity will necessitate companies to take a closer look at their approach.

Traditionally, data governance and the governance of tech associated with data has focused on topics such as master data management, data quality, and data retention – all primarily operational. With the rise of privacy laws and data protection acts such as the General Data Protection Regulation (GDPR) in the EU and the Personal Data Protection Act (PDPA) in Singapore, the scope of data governance has been expanded to include data privacy, personal data protection, and data sovereignty. This has shifted data governance out of the operational corner and into the spotlight of regulatory compliance and enforceable laws.

With AI being ready for prime time – that means large-scale production deployments – data and technology governance must step up again and include data and AI ethics and AI risk management.





Reading for us stuck-at-homes.

https://www.bespacific.com/ai-reading-list-8-interesting-books-about-artificial-intelligence-to-check-out/

AI reading list: 8 interesting books about artificial intelligence to check out

TechRepublic: “These eight books about artificial intelligence cover a range of topics, including ethical issues, how AI is affecting the job market, and how organizations can use AI to gain a competitive advantage. Artificial intelligence (AI) is an ever-evolving technology. With several different uses, it’s easy to understand why it’s being implemented more and more frequently. These titles answer common questions about AI, discuss what current AI technologies businesses are using, how humans can lose control over AI, and more…”





Lawyers have a future?

https://www.jdsupra.com/legalnews/the-future-of-the-legal-profession-ai-9264295/

The Future of the Legal Profession, AI and Legal Work

The legal profession faced down seemingly endless changes this past year, and many people are understandably wondering what’s in store for the future. In a recent webinar sponsored by Onit and titled The Future of the Legal Profession, leading economist Daniel Susskind tackled exactly that question, offering insights on what changes the industry should expect in the future, what role technology and AI will play and much more.

Susskind envisions two possible futures for the legal profession, both rooted in technology: one that’s simply a more efficient version of the current profession, and another in which technology actively displaces professionals.





I would like to see this get a bit more coverage. Perhaps we could get people to think before opening their mouths?

https://www.theregister.com/2021/02/05/smartmatic_election_lawsuit/

Vote machine biz Smartmatic sues Fox News and Trump chums for $2.7bn over bogus claims of rigged 2020 election

Electronic voting machine maker Smartmatic has sued Fox News, three of its hosts, and two of Donald Trump’s loyalists – Rudy Giuliani and Sidney Powell – for an eye-popping $2.7bn in defamation damages over the false claims it stole the 2020 presidential election for Joe Biden.

The lawsuit, filed Thursday with the Supreme Court in New York, accused Trump’s personal lawyer Giuliani and ex-federal prosecutor Powell of spreading lies by wrongly claiming that the manufacturer rigged its voting machines in favor of the Democrat contender.

It is said the pair used right-wing TV channel Fox News, along with its hosts – specifically, Lou Dobbs, Maria Bartiromo and Jeanine Pirro – to push this false narrative and effectively run an on-air “disinformation campaign” targeting Smartmatic. The overall goal, we're told, was to discredit the election’s results.

Smartmatic’s lawyers did not mince their words in their 285-page filing [PDF ].





Worth a careful read if you are a manager.

https://venturebeat.com/2021/02/04/why-process-mining-is-seeing-triple-digit-growth/

Why process mining is seeing triple-digit growth

Process mining enables companies to automate and streamline operations by identifying best practices and then disseminating them across an organization. This reduces waste, allocates physical and human resources more efficiently, and enables faster responses to internal and environmental changes. Gartner estimated that the market for dedicated process mining tools grew from $110 million in 2018 to $320 million in 2019.

The challenges of 2020 have shifted perspectives back toward efficiency for the sake of business continuity,” said Gustavo Gomez, CEO of Bizagi, a business process automation tools provider.





Something for my Grad Students to consider…

https://www.cpomagazine.com/data-privacy/new-isaca-report-enterprises-struggling-to-recruit-and-staff-technical-privacy-pros/

New ISACA Report: Enterprises Struggling to Recruit and Staff Technical Privacy Pros

Privacy pros with the necessary technical skills are in-demand and hard to find even for well-funded enterprises, according to a new report from IT governance association ISACA. Enterprises are having a harder time staffing technical privacy teams than they are filling out their legal & compliance teams, with long delays in filling job openings and shorthanded departments being common. With the demand for these specialized professionals only expected to increase in the near term, hiring managers are looking to cross-train current employees to become experts on specific regional regulations such as the EU’s General Data Protection Regulation (GDPR).





Now I get it. For the last few years he thought he was acting out a dream (nightmare) sequence and when he woke up everyone would live him…

https://www.cbsnews.com/news/trump-resigns-sag-letter/

Trump resigns from Screen Actors Guild as union considers disciplinary action





Is this the best you can do? Growing up in New Jersey I knew people who could use more than 402 ‘dirty words’ in a single sentence.

https://www.wired.com/story/ai-list-dirty-naughty-obscene-bad-words/

AI and the List of Dirty, Naughty, Obscene, and Otherwise Bad Words

COMEDIAN GEORGE CARLIN had a list of Seven Words You Can’t Say on TV. Parts of the internet have a list of 402 banned words, plus one emoji, 🖕.



Thursday, February 04, 2021

Is failure negligence?

https://www.bespacific.com/website-security-how-to-secure-protect-your-website/

Website Security: How to Secure & Protect Your Website

Law Technology Today: “With around 2 billion websites online in 2020, it’s easy to see why the internet has turned to be a goldmine for malicious actors in recent times. With tons of transactions and valuable information taking place online each day, hackers are always trying to come up with clever hacks to bypass any security measures you may have in place to protect your website. Although small website owners can overlook strict security protocols arguing that they may not have anything valuable on their sites to warrant a cyberattack, it’s important to note that hackers don’t just target large corporate and government websites. Recent statistics indicate that small and medium websites are hacker’s prime target. That is why implementing website security best practices should not be optional for any webmaster. It is mandatory. Website security refers to the steps a website owner undertakes to guard their site against cyber-attacks. It might involve employee training on safety practices or acquiring the right protection tools such as an SSL certificate. Below we look at website security more comprehensively and how you can secure and protect your website…”





Why a sound backup strategy is important.

https://www.databreaches.net/rise-in-ransomware-attacks-mistakenly-causing-data-destruction/

Rise in ransomware attacks mistakenly causing data destruction

Ionut Ilascu reports:

More and more ransomware victims are resisting the extortionists and refuse to pay when they can recover from backups, despite hackers’ threats to leak the data stolen before encryption.
This stance resulted in Q4 of 2020 seeing a significant decline in the average ransom payments compared to the previous quarter, says ransomware remediation firm Coveware.
But a more insidious phenomenon is prefiguring, where data is destroyed in the attack leaving companies no option to recover it, even if they pay the ransom.

Read more on BleepingComputer.





Think through the entire process you are trying to secure.

Nespresso smart cards hacked to provide infinite coffee after someone wasn't too perky about security

Vanhoof cracked the weak encryption and dumped the card's binary.

He then made a coffee purchase to see where the binary data changed, reflecting a credit deduction.

"We are working on the assumption that the value of the card is kept on the card itself rather than on some centralized server," said Vanhoof. "This is a much simpler and cost effective design, requiring less hardware and software to implement, making it a likely choice for anyone developing such a system unaware of the security weaknesses of the Mifare Classic."

Having identified the binary data on the card that changed with a purchase event, Vanhoof was able to alter the three bytes used to store monetary value and write the a value (€167,772.15) back to the card using the nfc-mfclassic tool. That would be a lot of coffee if he was unethical.





Why AI wants to eliminate humans?

https://thehackernews.com/2021/02/why-human-error-is-1-cyber-security.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Cyber+Security+Blog%29

Why Human Error is #1 Cyber Security Threat to Businesses in 2021

While technical solutions like spam filters and mobile device management systems are important for protecting end-users, with the number of threats and the multitude of systems and communications through which staff performs work, the one unifying risk factor that has to be addressed to improve fundamentally, security is the role of human error.

Access Now: The Complete Security Awareness Guide 2021 [Free eBook]





It’s for your own good!”

https://gizmodo.com/amazon-announces-totally-not-alarming-plan-to-install-s-1846194535

Amazon Announces Totally Not Alarming Plan to Install Surveillance Cameras in Every Delivery Vehicle

Not content to only wield its creepy surveillance infrastructure against warehouse workers and employees considering unionization, Amazon is reportedly gearing up to install perpetually-on cameras inside its fleet of delivery vehicles as well.

A new report from The Information claims that Amazon recently shared the plans in an instructional video sent out to the contractor workers who drive the Amazon-branded delivery vans.

In the video, the company reportedly explains to drivers that the high-tech video cameras will use artificial intelligence to determine when drivers are engaging in risky behavior, and will give out verbal warnings including “Distracted driving,” “No stop detected” and “Please slow down.”





Will this argument cross the border?

https://www.nytimes.com/2021/02/03/technology/clearview-ai-illegal-canada.html

Clearview AI’s Facial Recognition App Called Illegal in Canada

Canadian authorities declared that the company needed citizens’ consent to use their biometric information, and told the firm to delete facial images from its database.

… “What Clearview does is mass surveillance, and it is illegal,” Commissioner Daniel Therrien said at a news conference. He forcefully denounced the company as putting all of society “continually in a police lineup.” Though the Canadian government does not have legal authority to enforce photo removal, the position — the strongest one an individual country has taken against the company — was clear: “This is completely unacceptable.”

Mr. Therrien, along with three regional privacy commissioners in Canada, began an investigation into Clearview a year ago, after the article on the company was published. Privacy laws in Canada require getting people’s consent to use their personal data, giving the government grounds to pursue an inquiry. Authorities in Australia and the United Kingdom are jointly pursuing an inquiry of their own.

According to the commissioners’ report, Clearview said that it did not need consent from Canadians to use facial biometric information, because that information came from photos that were on the public internet. There is an exception in the privacy law for publicly available information. The commission disagreed.

Information collected from public websites, such as social media or professional profiles, and then used for an unrelated purpose, does not fall under the ‘publicly available’ exception,” according to the report. The commissioners objected to the images being used in a way that the posters of the photos hadn’t intended and in a way that could “create the risk of significant harm to those individuals.”

Clearview AI said that it planned to challenge the determination in court. “Clearview AI only collects public information from the Internet which is explicitly permitted,” Doug Mitchell, a lawyer for Clearview AI, said in a statement. “Clearview AI is a search engine that collects public data just as much larger companies do, including Google, which is permitted to operate in Canada.”





Perspective. How good is deepfake?

https://thenextweb.com/neural/2021/02/03/watch-singer-uses-deepfake-ai-to-transform-into-bowie-trump-and-zuckerberg/

Watch: Singer uses Deepfake AI to transform into Bowie, Trump, and Zuckerberg

Musician Steven Wilson has released a creepy Deepfake music video for his new single “Self.”

The prog rocker used the deep learning technique to swap faces with a range of celebrities — while holding on to his hair.

The full choir includes Donald Trump, Brad Pitt, Mark Zuckerberg, and David Bowie, the sole deceased member.

Some of the Deepfakes are more convincing than others. While Wilson’s hairstyle looks good on Brad Pitt (like everything else), Hillary Clinton struggles to pull off his stubble. [I don’t recognize half of the faces. Bob]





What’s next. A web the machines understand.

https://www.makeuseof.com/what-is-web-3-0-and-how-will-it-help-you/

What Is Web 3.0 and How Will It Help You?

Tim Berners-Lee, the creator of the World Wide Web, describes Web 3.0 as “read-write-execute.” It is a version of the Web that gives users the power to create and execute their own tools and software, rather than depending on other people for software.

Web 3.0, while still in its infancy, promises to make open, trustless, and permissionless networks possible. It consists of several elements that could serve as the building blocks for its success: edge computing, decentralized data networks, 3D graphics, and artificial intelligence.

The current structure of the internet is based on folksonomy, a method by which data and digital content are organized using tags and labels added by users to identify content.

Web pages are linked, and data shared between websites largely dependent on crowd knowledge for their content. With Web 3.0, machines can recognize a wider range of data sets to categorize the content. This makes it easier to engage users with more useful content.





Is Disney overprotecting kids or are they concerned about adult protests. Do movies influence kids more than mom & pop?

https://www.makeuseof.com/why-has-disney-plus-removed-films-for-kids/

Why Has Disney+ Removed Some Films From Kids' Profiles?

These movies contain several racist undertones and stereotypical representations of minorities such as Native Americans, East Asians, and African Americans.





Still not a PowerPoint fan, but sometimes you have to help your students…

https://www.bespacific.com/10-best-sites-for-free-google-slides-themes-powerpoint-templates/

10 Best Sites For Free Google Slides Themes & PowerPoint Templates

Hongkiat: “Your presentation cannot be perfect without the help of a companion set of beautiful, engaging, and informative slides. With the help of templates, you get a solid foundation for creating the perfect slides for your next presentation. Whether you use Google Slides or PowerPoint (online or offline), there is a ready-made presentation theme or template. In this write-up, I have compiled a list of 50+ places to download Google Slides themes and/or PowerPoint templates for creating your best presentation. I am going to discuss the best 10 websites in detail and list the others for you…”



Wednesday, February 03, 2021

Cry hacker and let slip the robot dogs of war!

https://www.newyorker.com/magazine/2021/02/08/the-next-cyberattack-is-already-under-way?currentPage=all

The Next Cyberattack Is Already Under Way

Amid a global gold rush for digital weapons, the infrastructure of our daily lives has never been more vulnerable.

someone should do something,” reads the T-shirt worn by one of Nicole Perlroth’s sources, a hacker from New Zealand, in “This Is How They Tell Me the World Ends: The Cyberweapons Arms Race (Bloomsbury). Someone should. But who? And do what? And about which of the Biblical plagues facing humankind? Perlroth is a longtime cybersecurity reporter for the Times, and her book makes a kind of Hollywood entrance, arriving when the end of the world is nigh, at least in the nightmare that, every night, gains on the day.





A brief overview. Worry if your organization uses ‘none of the above.’

https://www.csoonline.com/article/3605033/3-top-enterprise-file-encryption-programs-compared.html#tk.rss_all

3 top enterprise file encryption programs compared

Any of these encryption apps can safeguard a file’s contents, but differ in terms of supported platforms, remote capabilities, and features.





The law is what WE say it is.

https://techcrunch.com/2021/02/03/india-sends-warning-to-twitter-over-lifting-block-on-accounts-and-noncompliance-of-order/

India warns Twitter over lifting block on accounts and noncompliance of order

India has issued a notice to Twitter, warning the American social firm to comply with New Delhi’s order to block accounts and content related to a protest by farmers and not “assume the role of a court and justify non-compliance.” Failure to comply with the order may prompt penal action against Twitter, the notice warns.

The warning comes days after Twitter blocked dozens of high-profile accounts in India in compliance with New Delhi’s request, but later lifted the restriction.

Twitter “cannot assume the role of a court and justify non-compliance.



(Related)

https://www.buzzfeednews.com/article/tasneemnashrulla/facebook-takes-stand-myanmar-coup?scrolla=5eb6d68b7fedc32c19ef33b4

After Fueling A Genocide, Facebook Is Taking A Stand Against A Myanmar Coup

After failing to stem the hate speech and misinformation that fueled a genocide in Myanmar, Facebook now says it plans to take proactive content moderation steps following a military coup taking place in the country.





I don’t know about you, but I’m not tattooing a Copyright notice on my forehead. Not even a ‘®

https://www.bespacific.com/as-u-s-capitol-investigators-use-facial-recognition-it-begs-the-question-who-owns-our-faces/

As U.S. Capitol investigators use facial recognition, it begs the question: Who owns our faces?

Via LLRX As U.S. Capitol investigators use facial recognition, it begs the question: Who owns our faces? In the age of Big Tech, we need to grapple with what expectations we can and should have about who has access to our faces. The recent riot at the U.S. Capitol has put the question into the spotlight as facial recognition becomes a vital tool in identifying rioters: What is the power of facial recognition technology, and are we ready for it? Professor Wendy H. Wong discusses what are the costs and consequences of losing our faces to data, including the right to privacy and our ability to live our lives free of surveillance.



(Related) Like church and state, we shouldn’t mix health and security.

https://www.pogowasright.org/cdc-orders-air-travelers-to-unmask-for-government-surveillance/

CDC orders air travelers to unmask for government surveillance

Edward Hasbrouck writes:

Putting government surveillance and control of travelers ahead of what is supposed to be their mission of protecting of the public against infectious diseases, the U.S Centers for Disease Control and Prevention (CDC) has ordered that, effective today, all air travelers must risk their lives by removing their face masks on demand of Transportation Security Administration (TSA) checkpoint staff or airline ticketing or gate agents.
Until today, as we have noted previously, many state and local health orders issued in response to the COVID-19 pandemic required everyone in public indoor spaces such as airports to wear face masks, without any exception that would have applied at TSA checkpoints. Although we are not aware of any litigation that ensued, air travelers could have asserted their right — and even their duty — not to remove their face masks, under pain of criminal penalties for violating public health orders.
The CDC order effective today appears to be designed to preempt those state and local health orders, and open the door for the TSA, TSA contractors, and airline staff to endanger the lives of air travelers in the interest of surveillance and control (by the TSA) and “revenue protection” against transfers of nontransferable tickets (by airlines):

Read more on Papers, Please!





Perspective. Do businesses suffer the same problems?

https://news.usni.org/2021/02/02/berger-marines-need-to-trust-unmanned-ai-tools-for-future-warfare

Berger: Marines Need to Trust Unmanned, AI Tools for Future Warfare

The commandant of the Marine Corps said the service needs to make some big changes in a few short years to stay ahead of China’s growing military capability, but one of the biggest hurdles he sees is a lack of trust in the new unmanned and artificial intelligence systems he wants to invest in.

Gen. David Berger envisions a Marine Corps that leverages AI to shorten the sensor-to-shooter cycle and quickly take out adversaries that could threaten Marine forces. He envisions a self-updating logistics system that knows where the adversary is and can find new ways to route supplies to Marines. He envisions unmanned vehicles moving supplies and even perhaps taking on medevac missions. But all this relies on Marines trusting the unmanned and AI tools he buys them, and Berger said that trust isn’t there just yet.

… “We have programs right now, capabilities right now that allow for fully automatic processing of sensor-to-shooter targeting, but we don’t trust the data. And we still ensure that there’s human intervention at every [step in the process]. And, of course, with each intervention by humans we’re adding more time, more opportunities for mistakes to happen, time we’re not going to have when an adversary’s targeting our network,” he continued.

We have the ability for a quicker targeting cycle, but we don’t trust the process.”



(Related) How non-Marines do it.

https://venturebeat.com/2021/02/02/case-studies-of-successful-ai-startups/

Case studies of successful AI startups

Last week, technology analysis firm CB Insights published an update on the status of its list of top 100 AI startups of 2020 (in case you don’t know, CB Insight publishes a list of 100 most promising AI startups every year).

… A closer look at these startups provides some good hints at what it takes to create a successful business that makes use of AI. And (un)surprisingly, artificial intelligence is a small part — albeit an important one — of a successful product management strategy. Here are some of the key takeaways from AI startups that have managed to reach a stable status.





I’ve been celebrating birthdays at home, but this works too.

https://dilbert.com/strip/2021-02-03