Next to have their jobs automated: airport-security screeners?
Aviation and government authorities are starting to use machines in lieu of people to verify the identities of fliers by scanning their faces, irises or fingerprints. Dozens of airports in Europe, Australia and the U.S. already employ such technology so passengers can pass immigration checks without showing identification to, or talking with, a person. Now, several major airports in Europe have started using these automated ID checks at security checkpoints and boarding gates.
The use of biometrics—computers verifying identities through physical characteristics—and other automated techniques in airport security is raising questions about the strengths of man versus machine in detecting potential terrorists. Industry officials argue the advantages outweigh the risks, and are promoting automation to help make air travel more efficient and less frustrating—and to save money.
After Target conceded Thursday that its in-store point-of-sale systems were indeed hacked, compromising as many as 40 million debit and credit card accounts, fraud industry experts are seeing the information flood online card-selling markets to the tune of a “ten- to twentyfold increase” in high-value cards.
The hack, which affected only shoppers who made purchases physically at Target stores and not online customers, was a sophisticated operation. It allowed the hackers to glean customer names, credit and debit card numbers, expiration dates, and three-digit security codes from customers, data that can then be burned onto counterfeit cards and sold on the black market typically for $20 to $45 apiece.
However, Brian Krebs, the security blogger who broke the story of the breach, reported Fridaythat batches of up to 1 million cards were selling for anywhere from $20 to as high as $100 per card.
A top HealthCare.gov security officer told Congress there have been two, serious high-risk findings since the website’s launch, including one on Monday of this week, CBS News has learned.
Teresa Fryer, the chief information security officer for the Centers for Medicare and Medicaid Services (CMS), revealed the findings when she was interviewed Tuesday behind closed doors by House Oversight Committee officials. The security risks were not previously disclosed to members of Congress or the public. Obama administration officials have firmly insisted there’s no reason for any concern regarding the website’s security.
The Department of Health and Human Services (HHS) responded to questions about the security findings in a statement that said, “in one case, what was initially flagged as a high finding was proven to be false. In the other case, we identified a piece of software code that needed to be fixed and that fix is now in place. Since that time, the feature has been fully mitigated and verified by an independent security assessment, per standard practice.”
The National Security Agency arranged a clandestine US$10 million contract with computer security power RSA that allowed the spy agency to embed encryption software it could use to infiltrate the company’s widely used products, Reuters reported.
Revelations provided by former NSA contractor Edward Snowden and first reported in September showed that the NSA created and perpetuated a corruptible formula that was ultimately a “back door” into encryption products.
Reuters later reported RSA became the lead distributor of the formula, installing it into a software tool known as BSAFE that is widely used to boost security in personal computers and other products.
Unknown then was the $10 million deal that set the NSA’s formula as the default method for the security measure – in which random numbers are generated on a key for access to a product – in BSAFE, according to Reuters’ sources. Though the sum of money for the deal seems low, it represented over a third of revenue the relevant division at RSA had made the previous year, according to security filings.
Then the babbling CNN host claims “no one but me knows whether I am right or left…”
What a load of crap. These pro-propagandist types think if they say they are not hyper-partisan it somehow makes it true….because they said so — Even though their actions and everything they have supported openly proves the contrary.
Yes you are a progressive, Don Lemon, and yes, other people other then you are able to know it. The arrogance from these people!
Strange new off-white boxes popping up in downtown Seattle use wi-fi networks that can record the last 1,000 locations of a person using their cellphone’s MAC address, but the Department of Homeland Security – which funded the network to the tune of $2.7 million dollars – has refused to address the nightmare privacy implications of a system that could lead to the permanent tracking of an entire city’s population.
A report by The Stranger, a weekly Seattle newspaper, exposes how the boxes, which are attached to utility poles and include vertical antennae, can track cellphones even if they are not connected to the system’s wi-fi network.
Aruba – the company that provided the boxes to the Seattle Police Department – brags in its technical literature about how the boxes can keep track of “rogue” or “unassociated” devices, in other words your cellphone even if you have refused to let the system access your device’s wi-fi component.
The user’s guide for one of Aruba’s recent software products states: “The wireless network has a wealth of information about unassociated and associated devices.” That software includes “a location engine that calculates associated and unassociated device location every 30 seconds by default… The last 1,000 historical locations are stored for each MAC address.”
When reporters Matt Fikse-Verkerk and Brendan Kiley asked the Seattle Police Department and the Department of Homeland Security to explain what the boxes were for, the DHS refused to comment and Seattle Police detective Monty Moss would only state that the department “is not comfortable answering policy questions when we do not yet have a policy.”
In the past year or two, we in the liberty movement seem to have made a lot of progress in getting across the ideas of freedom and peace to a larger group of people. Live and Let Live is not totally dead yet.
Ron Paul’s 2012 Presidential campaign and his subsequent college campus appearances have very much reached the younger people.
Nevertheless, it seems like an exercise in futility to try to get the people to understand that the one main impediment to their freedom, prosperity and their future is the State.
The militarized NFL and the way football fans act at games, and the Watertown sheeple’s approval of the cops’ unconstitutional door-to-door searches to find one lone teenage terrorist suspect, are not good signs.
Sadly, it seems as though most people just feel comfortable deferring responsibility for their lives to the State. They don’t seem to mind putting the agents of the State on a pedestal, no matter how corrupt, no matter how criminally such government employees behave.
In the wake of the tragic shootings in Newtown, Connecticut, last December, many called for stricter gun control. Others called for better mental health care. Some called for more guns in the hands of teachers and school security officers.
Knightscope, a Silicon Valley startup, called for more robots.
“We founded Knightscope after what happened at Sandy Hook. You are never going to have an armed officer in every school,” William Santana Li, co-founder and CEO, told the New York Times.
Knightscope’s K5 is a 5-foot-tall, 300-pound robot that patrols areas like school campuses. It avoids objects while following a pre-programmed route. It sees in the dark using infrared sensors, determines the speed of moving objects and records audio for later retrieval. The robot can compare license plates to a list of approved or hot-listed plates.
The data collected from the robot’s sensors is processed alongside business, government and crowd-sourced social data sets to set a threat level for each potential irregularity. The public information serves to confirm a problem or provide an alternate explanation. If it deems a situation a serious problem, the robot notifies the authorities.
It could take a year to secure the risk of “high exposures” of personal information on the federal Obamacare online exchange, a cybersecurity expert told CNBC on Monday.
“When you develop a website, you develop it with security in mind. And it doesn’t appear to have happened this time,” said David Kennedy, a so-called “white hat” hacker who tests online security by breaching websites. He testified on Capitol Hill about the flaws of HealthCare.gov last week.
“It’s really hard to go back and fix the security around it because security wasn’t built into it,” said Kennedy, chief executive of TrustedSec. “We’re talking multiple months to over a year to at least address some of the critical-to-high exposures on the website itself.”