Search
Content type: Examples
An engineering and computer science professor and his team from The Ohio State University discovered a design flaw in low-powered Bluetooth devices that leaves them susceptible to hacking.
Zhiqiang Lin, associate professor of computer science and engineering at the university, found the commonly used Bluetooth Low Energy devices, such as fitness trackers and smart speakers, are vulnerable when they communicate with their associated apps on the owner’s mobile phone.
"There is a fundamental…
Content type: Examples
The Belgian Minister of Public Health has approved a programme under which telephone companies Proximus and Telenet will transfer some of their their data to the private third-party company Dalberg Data Insights in order to help combat the coronavirus epidemic; Orange has also agreed "in principle". The details are still to be agreed pending a legal and technical analysis of the proposed project. So far it has been reported that location data and real-time tracking would be used to assess the…
Content type: Examples
The Israeli prime minister, Benjamin Netanyahu, has authorised the country's internal security agency to use a previously secret tranche of mobile phone geolocation data, gathered to combat terrorism, to retrace the movements of individuals with confirmed cases of the coronavirus and identify people they've interacted with who should be quarantined. After Parliament's Secret Services Subcommittee ended its discussions without approving the measure, Netanyahu said the government would approve…
Content type: Examples
A phone-tracking system used by SAPOL for criminal investigations was used to better understand where a coronavirus-infected 60-year-old couple, who had travelled from Wuhan to visit relatives, roamed in Adelaide in order to identify people who might have been exposed, according to the South Australian police commissioner. Police used a program that only requires a phone number to initiate a download of where the phone has been used; to use it they must meet a legislative threshold…
Content type: Examples
Hakob Arshakyan, Armenia's minister of the high technology industry, has convened a research group comprising experts in IT and AI has been convened to collect and analyse data on the spread of coronavirus, compare it with the data collected by international partners, and develop forecasts. The minister believes that the research group's work will help provide accurate and reliable information that will help coordinate and manage containment efforts. As of March 19, Armenia had confirmed 122…
Content type: Examples
The "safety guidance texts" sent by health authorities and district offices in South Korea are causing information overload and have included embarrassing revelations about infected people's private lives. A text may include, for example, a link to trace the movements of people who have recently been diagnosed with the virus. Clicking on the link takes the user to the website of a district office that lists the places the patient had visited before testing positive. In one case, a man in his…
Content type: Examples
After an 18-month investigation involving interviews with 160 life insurance companies, in January 2019 New York Financial Services, the state's top financial regulator, announced it would allow life insurers to use data from social media and other non-traditional sources to set premium rates for its customers. Insurers will be required to demonstrate that their use of the information doesn't unfairly discriminate against specific customers. New York is the first state to issue specific…
Content type: Examples
A November 2018 report from Data & Society discusses "data craft", the methods manipulators use to create disinformation with falsified metadata, specifically platform activity signals, which can be read by machine learning algorithms, platforms, and humans. Manipulators use platform features in unexpected and skilful ways to evade moderation efforts, and their methods need to be understood. The report includes three case studies: politicians' accounts on Instagram, official US government…
Content type: Examples
In 2013, Edward Snowden, working under contract to the US National Security Agency for the consultancy Booz Allen Hamilton, copied and leaked thousands of classified documents that revealed the inner workings of dozens of previously unknown surveillance programs. One of these was PRISM, launched in 2007, which let NSA use direct access to the systems of numerous giant US technology companies to carry out targeted surveillance of the companies' non-US users and Americans with foreign contacts by…
Content type: Examples
Because banks often decline to give loans to those whose "thin" credit histories make it hard to assess the associated risk, in 2015 some financial technology startups began looking at the possibility of instead performing such assessments by using metadata collected by mobile phones or logged from internet activity. The algorithm under development by Brown University economist Daniel Björkegren for the credit-scoring company Enterpreneurial Finance Lab was built by examining the phone records…
Content type: Examples
A new examination of documents detailing the US National Security Agency's SKYNET programme shows that SKYNET carries out mass surveillance of Pakistan's mobile phone network and then uses a machine learning algorithm to score each of its 55 million users to rate their likelihood of being a terrorist. The documents were released as part of the Edward Snowden cache. The data scientist Patrick Ball, director of research at the Human Rights Data Analysis Group, which produces scientifically…