Why being data-centric is the first step to success with artificial intelligence – Tech Wire Asia

Being successful in deploying AI must start with a data-centric mindset. Source: Shutterstock.

REGARDLESS of industry, artificial intelligence (AI) is a disruptive technology that is greatly sought after.

Many organizations are looking to deploy AI projects at scale, in hopes of boosting performance and ultimately increasing revenues.

However, many fail to see returns on their AI investments. Often, this is because AI projects are not approached in the right manner.

To be AI-first, organizations need to adopt a data-first mindset. Heres how and why:

Using the right methodologies and technologies is crucial for the successful deployment of AI solutions.

It is not enough to just rely on agile methods, as they focus heavily on functionality and application logic delivery. Instead, data-centric methodologies such as the Cross Industry Standard Process for Data Mining (CRISP-DM) should be used, as they concentrate on the steps needed for a successful data project.

Depending on organizational needs, a hybrid methodology can also be deployed by merging the non-agile CRISP-DM with agile methodologies, making it more relevant.

Data-centric methodologies must be followed by the use of data-centric technologies. For any AI projects, organizations must always keep the end in mind, and have clarity on what the desired outcomes are.

Methodology and technology will not be of use without a data-proficient team.

There must be a specialized AI-team in place that can effectively collect, compile, and extract key information from seemingly haphazard data sets.

Ideally, the team should have a good mix of data scientists, engineers, and specialists that possess the skills to put models into operation.

There is no room for guesswork in AI deployment randomly changing data sets wastes unnecessary time and resources and is simply disastrous.

For a successful AI project to materialize, organizations ought to continuously invest for the long term.

Staying complacent is not an option. They must seek to refine the methodologies in place. If the technologies used are no longer relevant, they should be replaced.

AI projects will not work if employees lack the skills and tools needed to deploy them. Thus, employees should be upskilled, and also made to understand the value of AI, and how it can augment the work that they do.

While the technology is still in its infancy for large scale projects, it is only a matter of time before AI is deployed at scale, across organizations and markets.

Ultimately, it all boils down to agility and resilience in the midst of change. Those that adopt the right mindset will succeed, those that resist the change will suffer.

Emily Wong

Emily is a tech writer constantly on the lookout for cool technology and writes about how small and medium enterprises can leverage it. She also reads, runs, and dreams of writing in a mountain cabin.

Link:
Why being data-centric is the first step to success with artificial intelligence - Tech Wire Asia

MC Hammer Talks Music, Cheetos, and Artificial Intelligence – Cheddar

MC Hammer literally cant touch this. This Sunday, the hip hop legend will appear in a Super Bowl ad spot for Cheetos that plays on the snack foods famous messiness.

The commercial features a man with cheese-dusted fingers avoiding chores like moving a couch or doing paperwork to the tune of Hammers hit single U Cant Touch This.

Hammer himself pops up throughout the 30-second spot to sing his famous hook, including once as a mustachioed, sunglasses-wearing baby that the protagonist refuses to hold.

Cheetos

Given that this is the first Super Bowl spot for Cheetos in 11 years, the Frito-Lay-owned brand appears to have taken the go-big-or-go-home approach to Super Bowl marketing. No mere hired gun, Hammer waxed poetic to Cheddar about the beautiful bond between music and Cheetos.

I think Cheetos and music go hand in hand because all of us as kids ate Cheetos, he said. You take the memory of food, the memory of music, combine them together, and you got something great.

He also commented on the enduring appeal of U Cant Touch This, which marked its 30th anniversary this year.

It lives on because it still stimulates. Kids see it for the first time right now, and they start dancing. Its a special gift thats built inside the song, he said.

When asked if the music industry would continue to produce lasting hits like his own, Hammer expressed confidence that it would. How they produce them is the question, he said.

We dont know the platform. We dont know if its a new AI algorithm that drives engagement and the sharing of music. We dont know if its all going to be by suggestion, Hammer said.

The most likely scenario, according to the rapper, is that artificial intelligence will produce the hit singles of the future.

If machines can learn from machines, they could easily learn how to compose, Hammer said. Theyre already doing it, but its going to get better and better. In the near future, youll have songs that are completely produced by AI.

More:
MC Hammer Talks Music, Cheetos, and Artificial Intelligence - Cheddar

Shaping an Australian Navy Approach to Maritime Remotes, Artificial Intelligence and Combat Grids – Second Line of Defense

By Robbin Laird

During my visit to Australia last October, I had a chance to talk to a number of people about the evolving approach in Australia to maritime remotes and their evolving role within the fifth generation warfare approach or what I refer to as building a distributed integratable force or an integrated distributed force.

Towards the end of my stay, I had a chance to discuss with the key presenter on this topic at the Seapower Conference held in Sydney in early October, Commander Paul Hornsby, the Royal Australian Navy lead on maritime remotes.

We discussed a number of issues, but I am going to focus on where maritime remotes fit within the evolving strategic thinking of the Royal Australian Navy and its contribution to the ADF.

The broad point is that Australia is focusing on robotics and artificial intelligence more generally in its economy, with clear opportunities for innovation to flow between the civil and military sectors. Australia is a large island continent with a relatively small population. For both economic and defense reasons, Australia needs to extend the capabilities of its skilled manpower with robotic and AI capabilities. For the Navy, this means shaping a much large fleet in terms of a significant web of maritime remotes working interactively with the various manned assets operating in an area of interest.

Commander Hornsby highlighted the 2018 Australian Robotics Roadmap as an indicator of the Australian approach to cross-leveraging robotic systems and AI. As the report noted:

Robotics can be the force multiplier needed to augment Australias highly valued humanworkforce and to enable persistent, wide-area operations in air, land, sea, subsurface, spaceand cyber domains.

A second broad point is that Australia is working closely with core allies to forge a common R and D pool and to cross-learn from one another with regard to the operation of maritime remotes and their ability to deliver capabilities to the operational forces.

An example of the cross-learning and collaborative approach was Autonomous Warrior 2018. The exercise was a milestone in allied cooperation, according to Lt. Andrew Herring, in an article published on November 24, 2018.

When more than 50 autonomous technologies and over 500 scientists, technicians and support staff came together for AUTONOMOUS WARRIOR 2018 (AW18) in Jervis Bay, ACT, it marked the culmination of four years collaboration between the militaries, defence scientists and defence industries of five nations.

Today, Navys Deputy Director Mine Warfare Diving and Special Ops Capability, Commander Paul Hornsby, and Defence Science and Technologys (DST) Trusted Autonomous Systems Program Leader, Professor Jason Scholz, are exploring autonomous technologies with US Air Force Research Labs Senior Engineering Research Manager, Dr Mark Draper and Dr Philip Smith from the UKs Defence Science and Technology Laboratory.

The four, with their respective organisations, are collaborating under the Five Eyes Technical Cooperation Program (TTCP), which shares information and ideas among defence scientists from Australia, UK, USA, Canada and New Zealand, pursuing strategic challenges in priority areas.

Among them is TTCPs Autonomy Strategic Challenge, which aims to integrate autonomous technologies to operate together in different environments.

AUTONOMOUS WARRIOR2018 includes the Strategic Challenges fifth and final scientific trial Wizard of Aus a software co-development program aimed at managing autonomous vehicles from a shared command and control system that integrates with combat systems used by Five Eyes nations.

US Air Force Research Labs Dr Mark Draper summarises AW18s ambitious objective. What we are trying to achieve here is force multiplication and interoperability, where multiple unmanned systems from different countriesin the air, on the ground and on the surface of the water or even underwaterwould all be controlled and managed by one person sitting at one control station.

Two systems together

To achieve this, two systems have come together: AIM and MAPLE.

Allied IMPACT, known as AIM, combines best of breed technologies from Australia, United Kingdom, United States and Canada.

Weve brought these technologies together and integrated them into one control station and we are testing its effectiveness in reasonable and realistic military scenarios, Dr Draper said.

Australia has led development of three of AIMs eight modules: the Recommender, which uses artificial intelligence to analyse information and recommend actions to commanders; the Narrative, which automatically generates multimedia briefings about emerging operational situations; and DARRT, which enables real time test and evaluation of autonomous systems.

The Maritime Autonomous Platform Exploitation (MAPLE) system is a UK-led project providing the information architecture required to integrate a diverse mix of live unmanned systems into a common operating picture that is fed into the AIM Command and Control Station.

The sort of software co-development we are doing here is not usually done, UK Defence Scientist Dr Philip Smith said.

The evaluation team is using real time data logging to evaluate system performance, apply lessons learned and improve the software.

This is also giving us detailed diagnostics to determine where to focus effort for future development, he said.

Revolutionary potential

DSTs Professor Jason Scholz is optimistic about the potential for these technologies beyond AW18.

This activity has demonstrated what can be achieved when a spirit of cooperation, understanding and support exists between military personnel, scientists, engineers and industry.

Systems became more reliable as the exercise progressed with improvements made daily.

These highly disruptive technologies can potentially revolutionise how armed forces operate. The sort of cooperation weve seen at AW18 is vital for bringing these technologies into service.

It would be interesting to run a similar activity with these rapidly evolving technologies in two or three years, Professor Scholz said.

Lasting impact

Commander Hornsby, who has been the ADF lead for AW18 and is developing Navys autonomous systems strategy, says the activity has raised awareness among Australias Defence Force and defence industry.

The nearly 1000 visitors to AW18 gained fresh insights into the technologys current state of development and its potential to enhance capability.

As a huge continent occupied by a relatively small population with a mid-sized defence force by world standards, the force multiplier effect of autonomous systems is vital, which is why Australia is a leading developer.

The evaluations done at AW18 are also important internationally.

The world is watching AW18 closely because Australia offers the most challenging operating conditions for unmanned technologies. If they can make it here, they can make it anywhere, Commander Hornsby said.

Autonomous Warrior 2018 was a major demonstration and evaluation of the potential of robotic, autonomous and uninhabited systems, in support of Defence operations in coastal environments. It combined a dynamic exhibition, trials and exercising of in-service systems.

Australian industry contributed semi-autonomous vehicles for use in AW18 and developed data interfaces to enable control by Five Eyes systems. Contributing companies included Bluezone Group, Ocius, Defendtex, Australian Centre for Field Robotics, Silverton and Northrop Grumman. Vehicles were also contributed by Australian, NZ, US and UK government agencies.

In our discussion, Commander Hornsby noted that collaborative R and D and shared experiences was a key element of the Australian approach, but that Australia had unique operating conditions in the waters off of Australia, and systems that might work in other waters would not necessarily be successful in the much more challenging waters to be found in Northern and Western Australia, areas where the deployment of maritime remotes is a priority.

But one must remember that the maritime remote effort is a question of payloads and platforms. Not simply building platforms. Rear Admiral Mark Darrah, US Navy, made a comment about unmanned air systems which is equally applicable to maritime remotes: Many view UAS as a capability when in fact it should be viewed as a means of employing payloads to achieve particular capabilities.

His approach to maritime remotes is very much in the character of looking at different platforms, in terms of speed, range, endurance, and other performance parameters, measured up against the kind of payload these various platforms might be able to carry.

Calculations, of the payload/platform pairing and their potential impacts then needed to be measured up against the kind of mission which they are capable of performing. And in this sense, the matching of the payload/platform dyad to the mission or task, suggests prioritization for the Navy and the ADF in terms of putting in to operation the particular capability.

This also means that different allied navies might well have different views of their priority requirements, which could lead to very different timelines with regard to deployment of particular maritime remotes.

And if the sharing approach prevails, this could well provide the allied nations to provide cross-cutting capabilities when deployed together or provide acquisition and export opportunities for those allies with one another.

Commander Hornsby breaks out the missions for AUV and UUV employment in the following manner:

Home & Away operations

Pending combination, provides: Deterrence, Sea Control, Sea Denial, Power Projection or Force Protection

What this means is that different payload/platform combinations can work these different missions more or less effectively. And quite obviously, in working the concepts of operations for each mission or task which will include maritime remotes needs to shape an approach where their capabilities are properly included in that approach.

And in a 2016 briefing by Hornsby., he highlighted this point as follows:

But importantly, maritime remotes should not be looked at in isolation of the operation of the distributed force and how integratable data can be accumulated and communicated to allow for C2 which can shape effective concepts of operations.

This means that how maritime remotes are worked as an interactive grid is a key part of shaping an effective way ahead. And this allows for creative mix and matching of remotes with manned assets and the shaping of decision making at the tactical edge. Remotes and AI capabilities are not ends in of themselves; but are key parts of the reshaping of the C2/ISR capabilities which are reshaping the concepts of operations of the combat force.

In that 2016 briefing, Commander Hornsby provided an example of the kind of grid which maritime remotes enable:

To use an example in the European context, as the fourth battle of the Atlantic shapes up, if the allies can work cross-cutting maritime remote payload/platform capabilities and can operate those in the waters which the Russians intend to use to conduct their operations against NATO, then a new grid could be created which would have significant ISR data which could be communicated through UUV and USV grids to various parts of the 21st century integrated distributed combat force.

Such an approach is clearly crucial for Australia as it pushes out its defense perimeter but needs to enhance maritime security and defense of its ports and adjacent waters. And that defense will highlight a growing role for maritime remotes.

As Robert Slaven of L3Harris Technologies, a former member of the Royal Australian Navy, has put it:

The remotes can be distributed throughout the area of interest and be there significantly in advance of when we have to create a kinetic effect. In fact, they could be operating months or years in advance of shaping the decision of what kind of kinetic effect we would need in a crisis situation.

We need to learn how to work the machines to shape our understanding of the battlespace and to shape the kind of C2 which could direct the kind of kinetic or non-kinetic effect we are trying to achieve.

The featured photo showsHead of Royal Australian Navy Capability, Rear Admiral Peter Quinn, AM, CSC, RAN (right), Australian Defence Force personnel and industry partners watch the Defendtex Tempest Unmanned Aerial Vehicle display during AUTONOMOUS WARRIOR 2018 at HMAS Creswell.

Also, see the following:

Manned-Unmanned Teaming: Shaping Future Capabilities

Post Views: 1,602

Excerpt from:
Shaping an Australian Navy Approach to Maritime Remotes, Artificial Intelligence and Combat Grids - Second Line of Defense

NOW Introduces The First Snowboard Equipment Designed By Artificial Intelligence – Somag News

Together with the innovative ski equipment company NOW, Nidecker Group and ADDIT-ION, it introduced the first ski equipment designed by artificial intelligence.

There are many things artificial intelligence can do, many areas where it can operate. As the work in the field of artificial intelligence increases, new ones are added to these fields. Finally, support for artificial intelligence was received in the design of ski equipment.

Ski equipment manufacturer NOW, which is a very innovative company in its field, is; In collaboration with artificial intelligence design experts Nidecker Group and ADDIT-ION, it designed snowboard connection equipment through artificial intelligence and produced it using 3D printers.

A design came out of artificial intelligence where everything was considered:NOW turned to artificial intelligence to design a snowboard fitting that would have the most responsive connections, the most suitable structure for turns, and the highest rigidity with the least weight. For this purpose, support was obtained from ADDIT-IONs artificial intelligence and 3D printing technology.

Artificial intelligence produced different designs by using many different materials in Autodesk program. Then the most ideal one was chosen among these designs. Salo Arms, co-founder of ADDIT-ION, said, This concept will be the starting point for new paradigms where algorithms and personalization provide special and all-purpose designs in sports equipment.

The design of artificial intelligence is lighter than other designs:The connection system designed by artificial intelligence is 25% lighter than its current counterparts. Powder based 3D printing was used in the production of the part. Oriol Massanes from ADDIT-ION states that it is possible to print without support thanks to this method.

3D printing also allows the other parts of the connection equipment to be customized and printed. Thus, it is also possible to have completely personalized products. NOW founder JF Pelchat describes the results of information sharing as incredible. This initiative gives an idea about new products that may arise as a result of the cooperation of companies from different sectors.

The rest is here:
NOW Introduces The First Snowboard Equipment Designed By Artificial Intelligence - Somag News

Microsoft launches $40 million artificial intelligence initiative to advance global health research – seattlepi.com

Microsoft campus in Redmond.

Microsoft campus in Redmond.

Photo: Xinhua News Agency/Xinhua News Agency Via Getty Ima

Microsoft campus in Redmond.

Microsoft campus in Redmond.

Microsoft launches $40 million artificial intelligence initiative to advance global health research

Microsoft announced Wednesday that its newest $40 million investment in artificial intelligence (AI) will help advance global health initiatives, with two cash grants going to medical research at Seattle-based organizations.

As part of the tech giant's $165 million AI for Good initiative, this new public health branch will focus on three main areas: accelerating medical research around prevention and diagnosis of diseases, generating new insights about morality and global health crises, and improving health equity by increasing access to care for under-served populations.

"As a tech company, it is our responsibility to ensure that organizations working on the most pressing societal issues have access to our latest AI technology and the expertise of our technical talent," wrote John Kahan, Chief Data Analytics Officer at Microsoft in a company blog. "Through AI for Health, we will support specific nonprofits and academic collaboration with Microsofts leading data scientists, access to best-in-class AI tools and cloud computing, and select cash grants."

RELATED: Microsoft commits another $250 million for affordable housing. Here's where the money is going

One of the grants will go to Seattle Children's Hospital to continue their research on the causes and diagnosis of Sudden Infant Death Syndrome (SIDS). The Centers for Disease Control and Prevention estimated that 3,600 infants died in 2017 alone from SIDS.

Microsoft data scientists have already been working with researchers at Seattle Children's Hospital and discovered a correlation between maternal smoking and the fatal disease, estimating that 22 percent of the deaths from SIDS are attributed to smoking.

This research is personal for Kahan, who lost a son to SIDS.

"I saw firsthand, both personally and professionally, how you can marry artificial intelligence and medical research to advance this field, said Kahan in the program's launch event on Jan. 29. I saw because I lost my first son, and only son, to SIDS and I saw our head of data science partner with leading medical experts at Seattle Childrens and research institutes around the world."

Another grant will go towards Fred Hutchinson Cancer Research Center's Cascadia Data Discovery Initiative, which aims to accelerate cancer research by creating a data-sharing system for instructions and researchers across the Pacific Northwest to share biomedical data.

Other grants will benefit the Novartis Foundation for efforts to eliminate leprosy and Intelligent Retinal Imaging Systems to distribute diabetic retinopathy diagnostic software to prevent blindness.

These grants come as AI's rapidly growing role across industries is being debated by professionals, especially in medicine. Microsoft stated that less than 5% of AI professionals are operating in the health and nonprofit sector, leaving medical researchers with a shortage of talent and knowledge in the field.

RELATED:Feds release strategy for dealing with artificial intelligence - is it enough?

Technological innovations in AI are also moving faster than most doctors can prepare for. A recent study by Stanford Medicine found that only 7% of the 523 U.S. physicians surveyed thought they were "very prepared" to implement AI into their practice. The study called this a "transformation gap," citing that while most medical professionals can perceive the benefits of this technology for their patients, few feel prepared to adequately utilize it.

"Tomorrows clinicians not only need to be prepared to use AI, but they must also be ready to shape the technologys future development," the study states.

Other efforts in Microsoft's AI for Good initiative include AI for Earth, AI for Accessibility, AI for Cultural Heritage and AI for Humanitarian Action.

Continue reading here:
Microsoft launches $40 million artificial intelligence initiative to advance global health research - seattlepi.com

Strong Opinions on Whether Police Calls Should be Encrypted – Government Technology

(TNS) The question of whether police radio transmissions should be encrypted inspires strong opinions on both sides and one local police department has asked the public to weigh in on the issue.

Those in favor argue encryption which would prevent the public from listening to police communications is an officer-safety issue, since criminals listen to scanner transmissions.

Those opposed argue that encryption denies the public access to information it has the right to know, and poses a danger of police operating without accountability.

Encryption is a timely issue in Luzerne County, where a new digital 911 communication system is being rolled out this year. The system offers the option to encrypt police transmissions.

On Saturday, Wilkes-Barre Twp. police started a poll on the departments Facebook page, asking readers to vote whether they support encryption for some or all police calls. The post generated hundreds of responses.

Comments to the post from township police seem to indicate support for encryption, giving an example of a fleeing suspect who listened to a scanner app playing live audio of police looking for him.

West Pittston police Chief Michael Turner favors encryption.

I definitely support it, Turner said Sunday. It gives us some protection as far as bad guys having a radio.

Turner described encryption as an officer-safety issue, though he said no officers from his department have been injured because of open scanner transmissions.

Officers have found portable radios programmed to police frequencies in the possession of suspects, Turner said.

There are some operations we go out on we are using cell phones because we dont want transmissions done on the radio, the chief said.

Comments on the Wilkes-Barre Twp. Facebook page show a wide range of opinions on encryption.

Mary Jarrett, of Plymouth, who frequently posts to social media about borough and community issues, said she has become a big supporter of police from listening to scanner broadcasts. She said a three-minute delay would be acceptable but that police calls should be open to the public, noting sunshine disinfects and removes the we/they that permeates our society today.

Others who commented said transmissions about tactical incidents such as hostage situations should be encrypted, but not standard police calls.

A man who said he is a firefighter in Connecticut said he has gotten a head start on emergency calls by listening to open police transmissions.

Some expressed support for encrypting all police calls, to ensure officer safety and protect the privacy of innocent people.

Others took the polar opposite view, that a publicly funded communication system should be open to the public without restriction.

Luzerne County does not plan to encrypt fire or emergency medical calls, officials said last week at a demo of the new radios and equipment.

Questions remain as to whether police transmissions will be encrypted once the new system goes live, and whether that decision will be made countywide or left up to individual police departments.

Following last weeks equipment demo, Andy Zahorsky, data and technical support manager for Luzerne County 911, said the county will not mandate the use of encryption.

Emergency responders interviewed since then have given conflicting opinions as to whether the county will stipulate encryption of police calls countywide, or if police departments will have the option whether or not to encrypt transmissions.

Fred Rosencrans, county 911 executive director, said in an email sent Thursday that issues involving encryption are under review and there is no deadline for decisions to be finalized.

Contact the writer:

emark@citizensvoice.com

570-821-2117

2020 The Citizens' Voice (Wilkes-Barre, Pa.)

Visit The Citizens' Voice (Wilkes-Barre, Pa.) at citizensvoice.com

Distributed by Tribune Content Agency, LLC.

Here is the original post:
Strong Opinions on Whether Police Calls Should be Encrypted - Government Technology

The EARN IT Act is the latest clueless attack on encryption, do not fall for it – Privacy News Online

The latest attack on encryption is here, and its being championed under the cover of surprise surprise a necessary step to protect the children. Senator Lindsey Graham and Senator Richard Blumenthal are proposing a new bill called the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2019, abbreviated as the EARN IT Act.

You can read the draft bill here. In essence, if the EARN IT Act is passed, it will create a National Commission on Online Child Exploitation Prevention (NCOCEP) that will be responsible for drafting a set of rules that internet companies must follow in order to continue being eligible for protections under Section 230 of the Communications Decency Act. This is an issue for multiple reasons.

The NCOCEP would be headed by Attorney General Bill Barr, who has already made headlines multiple times for calling on tech companies to build in backdoors to encryption. He is willfully ignorant that such backdoors would only serve to damage trust and doesnt understand the basic concept that a backdoor, once built, can be used by the bad guys as well as the good guys. At its core, the EARN IT Act would give the Attorney General the power to force tech companies like Facebook to build backdoors into their encryption.

None of this commentary is to say that the children dont need protecting they do. The Department of Justice already has the power to crack down on internet companies if they are enabling online child exploitation in fact thats exactly the angle that was used in the takedown of Backpage.

Riana Pfefferkorn, writing for The Center for Internet and Society at Stanford Law School, lambasted the proposed law with a comprehensive criticism. She called the EARN IT Act what it really is, a way to ban end-to-end encryption without actually banning it.

The Senator behind the EARN IT Act has previously admitted to the world that he has never even sent an email whats more, hes proud of that fact. Senator Lindsey Graham is a committee member of the Subcommittee on Privacy, Technology and the Law but has no demonstrable knowledge of privacy, technology and is actually actively attempting to update the law to damage the two. End-to-end encryption is not something that can be legislated away. End-to-end encryption works as a byproduct of the laws of mathematics, and attempting to legislate that away is utter buffoonery. Alas, what can be expected when we entrust internet policy to people that fundamentally dont care about the internet?

This bill doesnt give the United States government any new powers, it just gives them the ability to strip away protections that keep the internet free. The thought that having such power under a committee that pledges to consider privacy concerns somehow makes it OK is laughable but thats how this latest attack on encryption is really being framed by its perpetrators. Now is the time to act and tell your representatives that the EARN IT Act is a nonstarter. As the Electronic Frontier Foundation (EFF) put it:

EARN IT is anti-speech, anti-security, and anti-innovation. Congress must reject it.

Featured image by Gage Skidmore shared via CC By 2.0 License.

Caleb Chen is a digital currency and privacy advocate who believes we must #KeepOurNetFree, preferably through decentralization. Caleb holds a Master's in Digital Currency from the University of Nicosia as well as a Bachelor's from the University of Virginia. He feels that the world is moving towards a better tomorrow, bit by bit by Bitcoin.

More here:
The EARN IT Act is the latest clueless attack on encryption, do not fall for it - Privacy News Online

For Whom the Bill Tolls: Encryption | Decipher – Decipher

A new draft bill written by Sen. Lindsey Graham, which is ostensibly designed to prevent online child exploitation, could have the effect of giving a federal commission the ability to stop service and platform providers from employing end-to-end encryption.

The bill is currently in the discussion draft stage but experts who have analyzed it say that not only could it have a broad effect on the use of encryption, it likely would not even have the intended effect of stopping the spread of exploitation material. The EARN IT Act is meant to address this problem by having a commission of appointed experts create a set of best practices for service providers to follow in identifying and removing exploitation material from their platforms. The United States attorney general would chair the committee and would have the authority to change the best practices.

The purpose of the Commission is to develop recommended best practices for providers of interactive computer services regarding the prevention of online 20 child exploitation conduct, the new bill says.

The bill would place broad responsibility for identifying, classifying, and removing child exploitation material on the service providers, something that would be impossible for services that are deployed with end-to-end encryption. The creation, distribution, and possession of child exploitation material is already illegal under U.S. law, and there is a separate law, the Communications Decency Act (CDA), that contains a portion known as Section 230 that protects service providers from being held liable for what users say and do on their platforms. Also, the Communications Assistance for Law Enforcement (CALEA), which requires that telecom companies enable wiretaps, has an exemption for so-called information services such as email, messaging, and other applications.

The bill that Graham (R-S.C.) is proposing would require service providers to adhere to the best practices laid out by the new commission or else potentially lose the exemption they have under Section 230 of the CDA.

The bill would, in effect, allow unaccountable commissioners to set best practices making it illegal for online service providers (for chat, email, cloud storage, etc.) to provide end-to-end encryption -- something it is currently 100% legal for them to do under existing federal law, specifically CALEA. That is, the bill would make providers liable under one law for exercising their legal rights under a different law, Riana Pfefferkorn, associate director of surveillance and cybersecurity at the Stanford Center for Internet and Society, wrote in a deep analysis of the bill and its potential effects.

The most obvious effect would be on services such as Signal, WhatsApp, Apple iMessage, and others that provide end-to-end encrypted messaging. Because of the way those systems are built, the providers do not hold the keys to decrypt users messages, so they dont have the ability to inspect messages for potentially abusive content. Although Grahams bill--which also includes input from Sen. Richard Blumenthal (D-Conn.)--doesnt explicitly mention encryption or specific services, the effects on those services would be extensive if theyre not able to comply with whatever best practices the commission develops.

Crypto is really the elephant in the room for the Graham Blumenthal bill, it's a signal for Facebook and Signal to provide this method or be prepared to pay through the nose, Pfefferkorn said during a talk at the Enigma conference earlier this week.

The other serious shortcoming with the bill, Pfefferkorn said, is that it wont have the intended effect of curtailing the spread of child sexual abuse material ( CSAM), because much of that already occurs on private sites and services.

The threat of losing Section 230 immunity will be scary to major tech companies such as Facebook that try in good faith to abide by federal CSAM law. But that threat will have no effect on the bad actors in the CSAM ecosystem: dark web sites devoted to CSAM, which already dont usually qualify for Section 230 immunity because they have a direct hand in the illegal content on their sites, Pfefferkorn wrote in her analysis.

The bill is still in the early stages, and these measures often change materially before theyre introduced. But, the U.S. government and law enforcement community have been pushing to weaken cryptosystems or limit their utility for more than 25 years, and this is just the latest link in that chain.

Here is the original post:
For Whom the Bill Tolls: Encryption | Decipher - Decipher

Call for Facebook encryption rethink after fear for child safety – The National

A POLL has shown that the majority of adults believe Facebook is failing in its duty of care to protect children, with three out of four believingit is unsafe.

TheNational Society for the Prevention of Cruelty to Children (NSPCC) Scotland has urged the tech giant not to turn a blind eye to abuse and rethink its encryption plans or face tough sanctions.

Out of 180 adults in Scotland, just one in five (22%) said the tech giant took the safety of children using the site seriously and two thirds (66%) believed the platform was failing in its duty of care to protect children.

The results for Scotland were similar to those of the whole Great Britain sample, which consisted of 2070 adults.

The claims came in an NSPCC/ Savanta ComRes poll following the tech giants announcement that they will encrypt messages on Facebook and Instagram.

The charity previously revealed that one in 25 young people (11- to 17-year-olds) who used Facebook or Facebook Messenger had sent, received or been asked to send sexual content to an adult.

It is now warning the tech giant not to create hiding places for abusers by pressing ahead with encryption plans that dont have strong safeguards in place.

CEO Mark Zuckerberg, who admitted that his plans would protect theprivacy of people doing bad things, has failed to give any clear answers in how he intends to stop groomers preying on children on his site.

The NSPCC is calling for supporters tosign an open letter to Facebookdemanding they put children first as part of its Wild West Web campaign.

Andy Burrows, NSPCC head of child safety online policy, said: Facebook has been called out for its abject failure to make their platforms safe, yet their encryption plans will give offenders a free pass to abuse children while they look the other way.

This cavalier approach risks creating a one-stop grooming shop if Facebook dont include strong safeguards that protect children in their encryption plan.

Boris Johnson must make it clear that upcoming regulation will force Facebook to guarantee childrens safety on its messaging services or be hit hard in the pocket for failing in its duty ofcare.

The NSPCC is calling for:

Follow this link:
Call for Facebook encryption rethink after fear for child safety - The National

Hardware-based Full Disk Encryption Market To Boom In Near Future By 2027 With Industry Key Players – Science of Change

The Global Hardware-based Full Disk Encryption Market report offers the important data to help the firms adapt up with the knowledge gap due to the advancements in the industry and effectively utilize the opportunities that present itself into the consistently evolving business sector.

Traits and market execution are researched utilizing quantitative and subjective systems to give a clear picture of current and future growth trends. An precise market investigation dependent on geographic areas is likewise displayed in this report. The global Hardware-based Full Disk Encryption Market report offers the information charts, figures, and guarantee that outlines the condition of the particular exchange the nearby and global scenario.

Leading Players of Hardware-based Full Disk Encryption are: Seagate Technology PLC, Western Digital Corp, Samsung Electronics, Toshiba, Kingston, Micron Technology Inc, Intel,

Global Hardware-based Full Disk Encryption Market: Regional Segmentation:

The chapter on regional segmentation details the regional aspects of the Global Hardware-based Full Disk Encryption Market. This chapterexplains the administrative system that is probably going to impact the overall market. It highlights the political scenario in the marketand envisions its effect on the Global Hardware-based Full Disk Encryption Market.

1. North America (the United States, Mexico, and Canada)

2. South America (Brazil etc.)

3. Europe (Turkey, Germany, Russia UK, Italy, France, etc.)

4. Asia-Pacific (Vietnam, China, Malaysia, Japan, Philippines)

Available Array of Customizations:

1.Country-level bifurcation of data in terms of Type and Application for any specific country/countries.

2. Expansion of scope and data forecasts until 2027

3. Company Market Share for specific country/countries and regions

4. Customized Report Framework for Go-To Market Strategy

5. Customized Report Framework for New Product/Service Launch and/or Expansion

6. Any other Miscellaneous requirements with feasibility analysis

The report correspondingly communicates the various conceivable outcomes for the progression of the market in the upcoming period. It also highlights earlier trends in the global Hardware-based Full Disk Encryption Market. The global Hardware-based Full Disk Encryption Market analysis is done based on revenue [USD Million] and size [k.MT] of the market.

The data offered in the report will assist the customers in improving their capacity to settle on exact choices identified with the business under Hardware-based Full Disk Encryption Market. The report also focuses on the ongoing and upcoming regulations and policies to be introduced by the government bodies, which may upgrade or smother the market growth.

Reasons to Invest in This Global Hardware-based Full Disk Encryption Market Report:

1. Highlights key industry priorities to aid organizations to realign their enterprise strategies.

2. Develop small business expansion plans by employing substantial growth offering emerging and developed markets.

3. Boost the decision-making process by understanding the plans which exude commercial interest concerning services and products, segmentation and industry verticals.

4. conserve reduce some time Undertaking Entry-level study by identifying the expansion, dimensions, top players and sections in the international Hardware-based Full Disk Encryption Market.

5. Researched overall worldwide market trends and prognosis along with all the factors driving the current market, in addition to those endangering it.

In conclusion, it is a deep research report on Global Hardware-based Full Disk Encryption industry. This Hardware-based Full Disk Encryption market report covers all the aspects of market vendors, product, its multiple applications, offer clients the scope to classify feasible market possibilities to expand markets. In addition to this, the trends and revenue analysis of the global Hardware-based Full Disk Encryption market has been mentioned in this report.

Read more:
Hardware-based Full Disk Encryption Market To Boom In Near Future By 2027 With Industry Key Players - Science of Change