Category identity management

We Underestimate The Threat Of Facial Recognition Technology At Our Peril

We underestimate the threat of facial recognition technology at our peril By Cynthia Wong, www.theguardian.comView OriginalAugust 16th, 2018 ‘The lack of safeguards combined with the centralisation of a massive amount of information raises the potential for abuse and ever-expanding mission creep’ Photograph: Damir Sagolj/Reuters On Friday, the identity matching services bill will be discussed at a hearing by the […]

China Is Going To New Lengths To Surveil Its Own Citizens

Excerpts: China Is Going to New Lengths to Surveil Its Own CitizensNew tech—including drones disguised as birds—can be a nightmare for Muslims in particular.BY SIGAL SAMUELTHE ATLANTIC By Read, www.defenseone.comView Original AP Photo/Ng Han Guan AA Font size + Print In this Nov. 4, 2017 photo, residents walk past a statue showing Mao Zedong near billboards with […]

Mapping Spies Through Fitness Trackers And Phones: Privacy Is Dead Even For Those In the Shadows

Mapping Spies Through Fitness Trackers And Phones: Privacy Is Dead Even For Those In the Shadows By Forbes Editors’ Picks, www.forbes.com View Original July 20th, 2018 Kalev Leetaru Contributor i #BigData Shutterstock This past January a university student discovered that a global public fitness tracker map could be used to discern highly sensitive security information about the locations and movements of […]

An Assessment Of The Likely Roles Of Artificial Intelligence And Machine Learning Systems In The Near Future

An Assessment of the Likely Roles of Artificial Intelligence and Machine Learning Systems in the Near Future divergentoptions.org · by Divergent Options · July 16, 2018 Ali Crawford has an M.A. from the Patterson School of Diplomacy and International Commerce where she focused on diplomacy, intelligence, cyber policy, and cyber warfare. She tweets at @ali_craw. Divergent Options’ content does not contain […]

HASC Chair Opening Remarks – Subcommittee On Emerging Threats & Capabilities

For Immediate Release: July 11, 2017 Contact: HASC Communications (202) 225-2539 OPENING REMARKS OF CHAIRWOMAN STEFANIK SUBCOMMITTEE ON EMERGING THREATS & CAPABILITIES WASHINGTON, DC – Today, Rep. Elise Stefanik (R-NY), Chairwoman of the House Armed Services Subcommittee on Emerging Threats and Capabilities, made the following remarks, as prepared for delivery, on the Subcommittee’s hearing titled “Department […]

Makeup Artists Have Found A Way To Defeat Facial Recognition Technology/Surveillance

Makeup Artists Have Found A Way To Defeat Facial Recognition Technology/Surveillance   http://www.fortunascorner.com      Caroline Haskins posted a July 2, 2018 article on the website, TheFuture.com, with the title, “Juggalos Figured Out How To Beat Facial Recognition,” technology using Juggalo makeup. Ms. Haskins writes that “according to Twitter user @tahkion, a computer science blogger for WonderHowTo.com, Juggalo makeup outmatches […]

China Is Taking Digital Control Of Its People To Chilling Lengths

Conclusion:   As a way of using digital technology for social control, this takes some beating. There are already pilot systems in operation. The Chinese plan to have the system fully in place by 2020. By which time it will be ready for export to other countries – who will be queueing up to buy […]

Blockchain Will Help ‘Drive This Next Industrial Revolution,’ Wall Street Bull Predicts; One Of 5 Key Technologies, Along With Automation, Artificial Intelligence, The Internet-Of-Things, And Robotics; And, It Has Enormous Implications For Warfare, & Espionage

Blockchain Will Help ‘Drive This Next Industrial Revolution,’ Wall Street Bull Predicts; One Of 5 Key Technologies, Along With Automation, Artificial Intelligence, The Internet-Of-Things, And Robotics; And, It Has Enormous Implications For Warfare, & Espionage   http://www.fortunascorner.com      Digital currency and Bitcoin may get sucking out most of the oxygen in the room; but, […]

North Korea’s Elite Quitting Facebook, Concealing Internet Activity: Researcher

North Korea’s elite quitting Facebook, concealing internet activity: researcher By Dustin Volz, www.reuters.com View Original April 25th, 2018 WASHINGTON (Reuters) – North Korea’s ruling class has in recent months abandoned Western social media sites such as Facebook (FB.O), Instagram and Alphabet’s Google (GOOGL.O) and dramatically increased its use of tools that cloak internet activity, according to cyber […]

8 Ways Hackers Monetize Stolen Data

8 Ways Hackers Monetize Stolen Data   https://fortunascorner.com      Steve Zurier posted an April 17, 2018 article to the security and technology website, DarkReading.com, with the title above.  We are all well aware that our personal data has likely been compromised many times in the past decade because of the plethora of gaps and vulnerabilities with […]