Is this the future? School surveillance 24/7/365? No doubt they will want the best technology, like facial recognition, etc.
https://www.ksl.com/article/50459109/davis-school-district-installs-districtwide-surveillance-system
Davis School District installs districtwide surveillance system
The Davis School District now has an around-the-clock monitoring center, where it can keep eyes on cameras and conditions across 120 buildings.
… Someone will be in the center 24 hours a day, every day of the year.
… Monitors can shut down systems from here, even lock down buildings. It's something Mott said that will continue to improve just in case one of those worst-case scenarios ever happens here.
"We're working to coordinate and work with schools on drills, whether they be fire drills or lockdown drills, those kind of things, we're always preparing and practicing," he said.
Two kinds of fraud.
https://www.theregister.com/2022/08/16/social_engineering_cyber_crime_insurance/
PC store told it can't claim full cyber-crime insurance after social-engineering attack
A Minnesota computer store suing its crime insurance provider has had its case dismissed, with the courts saying it was a clear instance of social engineering, a crime for which the insurer was only liable to cover a fraction of total losses.
SJ Computers alleged in a November lawsuit [PDF] that Travelers Casualty and Surety Co. owed it far more than paid on a claim for nearly $600,000 in losses due to a successful business email compromise (BEC) attack.
… Travelers, which filed a motion to dismiss, said SJ's policy clearly delineated between computer fraud and social engineering fraud. The motion was granted [PDF] with prejudice last Friday.
Who gets to define ‘reasonable?’
US regulator urges MFA and puts banks on notice – not reasonably protecting data is illegal
Jim Nash reports:
A U.S. consumer finance regulator has published a circular warning that insufficient security for consumer biometric and other personal data is illegal under federal law. Multi-factor authentication is singled out as a method of making data security sufficient.
Anyone reading that who still thinks it will never happen to them is invited to read on to find out about the tech company who just fell victim.
The Consumer Financial Protection Bureau says that not protecting the data can be found to be an unfair practice under 12 U.S.C. 5536 for financial institutions. Officials cite preventative practices that can minimize risk.
Read more at Biometric Update.
(Related) Should similar rules apply?
Period and pregnancy tracking apps have bad privacy protections, report finds
Most popular period and pregnancy tracking apps don’t have strong privacy protections, according to a new analysis from researchers at Mozilla. Leaky privacy policies in health apps are always a problem, but issues that fall into this particular category are especially concerning now that abortion is illegal in many places in the United States.
Period and pregnancy tracking apps collect data that could theoretically be used to prosecute people getting abortions in places where it’s illegal. Data from period tracking apps isn’t the biggest thing used to tie people to abortions right now — most often, the digital data used in those cases comes from texts, Google searches, or Facebook messages. But they’re still potential risks.
Do we have an acceptable answer?
https://venturebeat.com/ai/who-owns-dall-e-images-legal-ai-experts-weigh-in/
Who owns DALL-E images? Legal AI experts weigh in
When OpenAI announced expanded beta access to DALL-E in July, the company offered paid subscription users full usage rights to reprint, sell and merchandise the images they create with the powerful text-to-image generator.
A week later, creative professionals across industries were already buzzing with questions. Topping the list: Who owns images put out by DALL-E, or for that matter, other AI-powered text-to-image generators, such as Google’s Imagen? The owner of the AI that trains the model? Or the human that prompts the AI with words like “red panda wearing a black leather jacket and riding a motorcycle, in watercolor-style?”
What if we decide that AI is not responsible for its actions?
https://www.economist.com/podcasts/2022/08/16/will-ai-achieve-consciousness
Will AI achieve consciousness?
Our podcast on science and technology. This week, we explore whether artificial intelligence could become sentient—and the legal and ethical implications if it did
A DEBATE has been raging in technology circles, after an engineer at Google claimed in June that the company’s chatbot was sentient. Host Kenneth Cukier explores how to define “sentience” and whether it could be attained by AI. If machines can exhibit consciousness, it presents myriad ethical and legal considerations. Is society equipped to deal with the implications of conscious AI?
Runtime: 44 min
Would any ‘civilian’ vendor be able to stop military applications?
https://www.theregister.com/2022/08/17/russia_weaponizes_chinese_drones_robots/
Russian military uses Chinese drones and bots in combat, over manufacturers' protests
Russia's military has praised civilian grade Chinese-made drones and robots for having performed well on the battlefield, leading their manufacturers to point out the equipment is not intended or sold for military purposes.
When a video of a robot camera dog showed up with a grenade launcher on Russian state-sponsored media RIA Novosti this week, many immediately recognized it as Chinese Unitree Robotics' $2,700 Go1 robotic dog – albeit dressed in a sort of canine ninja suit.
Always good to know the players. Also points to some resources.
https://www.techspot.com/article/2515-surveillance-intelligence-alliances/
A Surveillance Primer: 5 Eyes, 9 Eyes, 14 Eyes
… In 2021, the US Federal Trade Commission published a 74 page report documenting how internet service providers are collecting vast amounts of private data from their customers and then selling the data to third parties. We examined this report, the implications, and some solutions in our article on internet service providers logging browsing activity.
These practices are well-documented in the PRISM surveillance documents and also the infamous Room 641a example with AT&T and the NSA. Fortunately, there are some simple solutions to keep your data safe that we'll cover below. In this guide, we'll explain all the different "X" eyes surveillance alliances and why this topic is important when choosing privacy tools.
No comments:
Post a Comment