On The Wire

Netflix Fails Privacy Test

Streaming is the method of viewing video or listening to audio content on an internet-connected device without downloading the media file. It is the continuous transmission of a video or audio file from a server to a subscriber. Anyone with an internet connection can watch movies or make a video ...
Continue Reading
/

The Pegasus Spyware Scandal

Human rights experts at the United Nations issued a statement last week calling for a global moratorium on the sale and transfer of surveillance technology until regulations are in place that guarantee its use in compliance with international human rights standards. The call came against the backdrop of a sensational ...
Continue Reading
/

Chinese Prosecutor Indicted in Extralegal Operation Fox Hunt

Operation Fox Hunt is a global covert program administered by the People's Republic of China that uses threats and intimidation to target dissidents in the Chinese diaspora under the guise of a campaign to repatriate corrupt Communist Party members to face criminal charges. The Canadian Security Intelligence Service has said ...
Continue Reading
/

The Ethics of Voice Cloning

Digital cloning is a technology that uses deep learning algorithms to manipulate audio, photographs and videos making it difficult to distinguish what is fake from what is real. Although the technology has been used for beneficial educational purposes, such as synthesizing audio books without human readers, concerns continue to emerge ...
Continue Reading
/

Privacy and Genetic Genealogy Sites

Investigative genetic genealogy is a technique used by law enforcement to identify suspects in criminal investigations. It involves uploading a crime scene DNA profile to one or more genetic genealogy databases with the object of identifying a suspect's relatives and, eventually, locating the suspect in the family tree. The prospect ...
Continue Reading
/

Machine Learning and Mass Manipulation

What are the consequences when machine learning techniques are brought to bear on the individual? Not only is large scale manipulation possible, it can be achieved with relative ease. By manipulating what people are exposed to, content providers can achieve targeted influence on an individual's emotional state, political leanings and ...
Continue Reading
/

The Colonial Pipeline Cyberattack

On May 7, 2021, Colonial Pipeline Co. sustained a ransomware cyberattack disabling the computerized equipment that manages its pipeline. The pipeline carries gasoline, diesel and jet fuel from Texas to New York and services much of the eastern seaboard. It was the largest cyberattack on an oil infrastructure target in ...
Continue Reading
/

The Algorithms Shaping Our World

Machine learning is supplementing or replacing human decision making in virtually all sectors of society. Law, medicine, education, insurance, banking, advertising, communication, dating. The list goes on. Netflix Recommendation Engine filters content and makes recommendations for subscribers. Google Street View images have been used to estimate the demographic makeup of ...
Continue Reading
/

Cyberespionage and the New Hacktivism

Cyberespionage is the act of obtaining information from individuals, governments and private-sector entities without permission for political or military advantage. In the cyber universe espionage involves access to computers or networks for a strategic gain. It is distinct from cyber threats motivated by theft or fraud. A hacker is someone ...
Continue Reading
/

Machine Learning: Privacy in Processing

Machine learning is shaping our society. It is used virtually everywhere. Simply living modern life has created an explosion of data. Improvements in processing capabilities allow for unprecedented levels of analysis. Machine learning is a core component of artificial intelligence. Advanced algorithms are capable of gleaning insights and correlations between ...
Continue Reading
/