Artists For Our Pre-Internet Brains
“The part of our brain that regulates our time perception has been overloaded and exhausted, causing our sense of past, present and future to melt together.” – The Guardian
\
Sources familiar with WhatsApp’s internal investigation into the breach said a “significant” portion of the known victims are high-profile government and military officials spread across at least 20 countries on five continents
Bell plans to use artificial intelligence to combat scam phone calls
Bell is exploring a new call-blocking system that would use artificial intelligence to screen for potential phone scammers. The new system would block known fraudulent numbers across the network and incorporate AI and machine learning to identify suspicious activity.
The increase in fraud calls over the last year, which the RCMP said garnered 4000 victims who lost $15 million, has attracted the attention of regulators such as the CRTC.
While Bell aims to use AI to combat scam calls, scammers are also beginning to use the technology. In a recent case in Europe, scammers used AI to replicate the voice of a company executive, and then called an employee demanding a quarter of a million dollars be sent to a secret account in Hungary.
The Globe and Mail, Bell plans to use artificial intelligence to combat spam phone calls
Criminal artificial intelligence may be coming for your money: Don Pittis
Breaking Down the Barriers to Innovation BEANS - behavior enablers, artifacts, and nudges
Whistleblower protection makes usunequal before the law
Maria Butina: The “60 Minutes” interview CBS. chuck roast: “not to be confused with kim philby
Pete Recommends – Weekly highlights on cyber security issues, October 26, 2019 – Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Equifax Allegedly Made It Super Easy to Hack Customer Data; New App Helps Prevent Fraud at the Gas Pump; The Wayback Machine’s Save Page Now is New and Improved; and Trading in your phone may pose a risk to your data, one expert warns
How the Rich Are Different: Hierarchical Power as the Basis of Income Size and Class Blair Fix, SocArXiv
“There is such a thing as return on creativity, there’s an X factor that creativity can provide,” says PwC’s Russel Howcroft.
~
Advertising guru calls for creative leadership in government
Resources for Measuring Cybersecurity
R Street – Kathryn Waldron, Resident Fellow, National Security & Cybersecurity – Resources for Measuring Cybersecurity – A Partial Annotated Bibliography – PDFIn the field of cybersecurity, there is no well-defined system that is capable of measuring cybersecurity in an objective, quantifiable, and comparative manner.In light of this, the R Street Institute National Security and Cybersecurity Program has launched an initiative intended to fill this gap and create a system that is widely-accepted and easily accessible to decision-makers with limited resources.This partial bibliography compiles a baseline of existing disparate measurement efforts. The document both summarizes the existing field and characterizes it.This bibliography is neither comprehensive nor overtly technical in nature. Rather, it’s goal is to provide a systematic overview of the field that is both technically literate and of use to decision-makers in the public and private sectors.Without accurate, standardized methods to measure cybersecurity, detecting and deterring cyber threats will continue to be more art than science. This partial attempt will shed light on some of the most pervasive and exciting work that has been and is currently being done
Gartner Top 10 Strategic Technology Trends for 2020
Heading into the network’s 50th anniversary, Pew Research Center and Elon University’s Imagining the Internet Center asked hundreds of technology experts, including Kleinrock and fellow internet pioneers, how individuals’ lives might be affected by the evolution of the internet over the next 50 years. Overall, 530 technology pioneers, innovators, developers, business and policy leaders, researchers and activists in the nonscientific canvassing responded to this query: The year 2019 will mark the 50th anniversary of the first host-to-host internet connection. Please think about the next 50 years. Where will the internet and digital life be a half century from now? Please tell us how you think connected technology, platforms and applications will be integrated into people’s lives. You can tackle any dimension of this question that matters to you. You might consider focusing on questions like this: What changes do you expect to see in the digital world’s platform companies? What changes do you expect to see in the apps and features that will ride on the internet? How will digital tools be integrated into everyday life? What will be entirely new? What will evolve and be recognizable from today’s internet? What new rules, laws or innovations in its engineering over the intervening years will change the character of today’s internet? Considering what you just wrote about your expectations for the next 50 years, how will individuals’ lives be affected by the changes you foresee?” Read the report here.