On his first visit he shared the Digital Analytics Maturity Model, next came the Radical Analytics Manifesto, and after skipping a year, he is back in force with interesting stories about digital transformations, customer centricity, use and abuse of data, and the secret life of digital analysts.
ATHack! Inc. (pronounced “attack”) is a group of activists and technologists sourcing, funding, and launching new and innovative data-driven ideas to solve major social issues. Our inaugural hackathon is focused on developing tools and solutions that will support anti-human trafficking efforts. Viable projects that come out of our hackathons are invited to apply to our accelerator program in order to become sustainable operations that can help the community. We deeply encourage multi-cultural and multi-gendered diversity in attendance of our hackathons, seeking to grow entrepreneurship among women and people of color. Finding innovative solutions to community issues can only be done thoughtfully and holistically by engaging all aspects of our multi-cultural and multi-gendered community. Types of tech projects we look to catalyze include, but are not limited to: data centric models to fighting human trafficking, software/hardware tech solutions for poverty afflicted populations, resource solutions for the homeless, etc.
The First Responder Network Authority (FirstNet) is charged by Congress with building a nationwide wireless LTE network for first responders. It recently issued an RFP seeking a private partner to build the network. After the private partner is chosen, FirstNet must submit a plan to each state, and the Governor of each state can opt in or out of the plan. Who will win the bid? Will most Governors "opt in" to the plans of this federal government agency? What are the odds FirstNet will succeed?
In democracies, demonstrating is a legitimate way for citizens to let their officials know how they feel about important topics and try to change policies or attitudes. Peaceful demonstrations are powerful to keep the checks and balances in democracies. As we have seen over the ages (going back to Roman times), once demonstrations turn into riots, democracies are shaken to the core. During a riot, the fine line between being an activist and a criminal is often crossed.
For law enforcement, restoring and keeping order is a challenge. It involves identifying the agitators, those actors who believe that violent means justify the cause, and those who join demonstrations (often in other cities) to create trouble. Law enforcement needs to have the tools to identify and separate the bad apples from the rest to protect the fundamental democratic right to demonstrate.
Everyone loves to use the phrase wearable tech–and to talk about how many billions there are to be made–but if wearables are so great, why do they all suck?
Find out why it's important to think beyond screens and to consider the crucial roles of fashion, utility, fun, and sustainability in your product concept.
ATHack! Inc. (pronounced “attack”) is a group of activists and technologists sourcing, funding, and launching new and innovative data-driven ideas to solve major social issues. Our inaugural hackathon is focused on developing tools and solutions that will support anti-human trafficking efforts. Viable projects that come out of our hackathons are invited to apply to our accelerator program in order to become sustainable operations that can help the community. We deeply encourage multi-cultural and multi-gendered diversity in attendance of our hackathons, seeking to grow entrepreneurship among women and people of color. Finding innovative solutions to community issues can only be done thoughtfully and holistically by engaging all aspects of our multi-cultural and multi-gendered community. Types of tech projects we look to catalyze include, but are not limited to: data centric models to fighting human trafficking, software/hardware tech solutions for poverty afflicted populations, resource solutions for the homeless, etc.
The First Responder Network Authority (FirstNet) is charged by Congress with building a nationwide wireless LTE network for first responders. It recently issued an RFP seeking a private partner to build the network. After the private partner is chosen, FirstNet must submit a plan to each state, and the Governor of each state can opt in or out of the plan. Who will win the bid? Will most Governors "opt in" to the plans of this federal government agency? What are the odds FirstNet will succeed?
In democracies, demonstrating is a legitimate way for citizens to let their officials know how they feel about important topics and try to change policies or attitudes. Peaceful demonstrations are powerful to keep the checks and balances in democracies. As we have seen over the ages (going back to Roman times), once demonstrations turn into riots, democracies are shaken to the core. During a riot, the fine line between being an activist and a criminal is often crossed.
For law enforcement, restoring and keeping order is a challenge. It involves identifying the agitators, those actors who believe that violent means justify the cause, and those who join demonstrations (often in other cities) to create trouble. Law enforcement needs to have the tools to identify and separate the bad apples from the rest to protect the fundamental democratic right to demonstrate.
Everyone loves to use the phrase wearable tech–and to talk about how many billions there are to be made–but if wearables are so great, why do they all suck?
Find out why it's important to think beyond screens and to consider the crucial roles of fashion, utility, fun, and sustainability in your product concept.
Algocracy and the state of AI in public administrations.Sandra Bermúdez
AI, as technical approach to solve problems, now is deploying in social systems and public administrations. What are the effects? the challenges? should we fear? What should we do?
Dissecting the dangers of deepfakes and their impact on reputation Generative...CSIRO National AI Centre
At the recent Generative AI Conference - This talk defined deepfakes and the widespread damage misinformation can cause. In order to build awareness of the ethical implications of deepfakes. At the
National AI Centre, Responsible AI and Responsible AI Network
allows us to action a way to use AI that is aligned to Australia's AI ethics principles.
Artificial Intelligence (AI) – Two Paths to ISO CompliancePECB
Although the Security Profession has always aspired to prevent adverse events, we have found ourselves stymied in the world of Reactive Detection—the path most commonly taken in one’s pursuit of ISO compliance. Our webinar will explore the new emerging paradigm Artificial Intelligence (AI) and what it portends for the future.
Main points covered:
• Security Profession always aspired to be Proactive, but found ourselves stymied in the World of the Reactive.
• Traditional boundaries of interest are growing ever more porous, exacerbated by the exponential growth of the IoT.
• With the advance of AI we now have a choice: remain ensconced in the paradigms of the past or evolve to the new proactive paradigm which AI portends.
Presenter:
John McClurg serves as Vice President and Ambassador-At-Large of Cylance, where he is responsible for building Security and Trust programs & operational excellence efforts. Prior to Cylance, he served as the CSO of Dell, Honeywell, and Lucent and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation (FBI). He also served as a Deputy Branch Chief of CIA where he helped to establish the new Counterespionage Group and was responsible for the management of complex counterespionage investigations. McClurg was voted one of America’s 25 most influential security professionals.
Link of the recorded session published on YouTube: https://youtu.be/D76BXU15fCY
Like electricity or the steam engine, Artificial Intelligence (AI) is a true general purpose technology: It can be used to drive economic gains, but also to project hard and soft power. Its widespread adoption will irrevocably change the international order as its effects on welfare, trade and defense transcend national boundaries.
In this keynote speech, Simon Mueller, Expert on AI Governance and Executive Director of the AI Initiative of The Future Society, will provide perspective on the range of issues, speak about current dynamics and discuss options to address emerging challenges.
Goals, Risks and Countermeasures in the Artificial Intelligence EraGabriele Graffieti
In the last decade, Artificial intelligence (AI) has definitely transformed our society, making us deeply affected by its development and the services that AI provides to us. But who owns and control AI? What are the major risks associated to it? How institutions could intervene to avoid that such an important technology will be in the hands of few individuals?
In this talk we'll explore the major technological, ethical and social risks that can be associated with an incorrect development of AI, and some countermeasures in order to avoid such risks. After that we'll discuss some examples and projects of AI used as a technology at the service of people.
Have we poisoned the internet for good?Yoav Aviram
Have we poisoned the Internet for good? It is time to take a long hard look at where we have ended up, and consider whether the Internet does more harm than good, in terms of our quality of life.
Video: https://www.youtube.com/watch?time_continue=763&v=q5x7njMMugw
Merit Event - Closing the Back Door in Your Systemsmeritnorthwest
Loss of critical documents and data, via the back-door, is the the biggest threat to many organisations today, big and small, yet has been almost entirley neglected until now".
Barry James, the UK’s leading expert in the emerging field of mobile applications and endpoint security, will explore the emerging threat and explain the remedies available.
A vast network of investigative reporters collaborated on a global scale to dive into the financial documents known as the Panama Papers. It took months to sift through the 11.5 million leaked documents. We’ll look at how the data were organized, how such a large, global project was kept secret, and get insights into how reporters started shaping their ongoing stories.
Cyber is one of our areas that we also promote in Must HighTech Expo. We invite you to participate in our virtual exhibitions, on different high tech thematic and especially on cybersecurity.
The future of marketing isn't Big Data & AI, it's not yet another social media network or some magic technology. The future of marketing is about problem solving, critical thinking, creativity, a sense of ethics and all those irreproducible things that makes us unique and human.
Watch the full presentation on YouTube: https://youtu.be/RhN3kv_-Llw
The Elasticity of Analytics Ethics - WaW Copenhagen, August 2020Stéphane Hamel
Stéphane challenges what we take for granted and shares real-life examples of questionable ethics and malpractice which will hopefully make you think about your own red line, as a marketer, an analyst and a consumer.
Algocracy and the state of AI in public administrations.Sandra Bermúdez
AI, as technical approach to solve problems, now is deploying in social systems and public administrations. What are the effects? the challenges? should we fear? What should we do?
Dissecting the dangers of deepfakes and their impact on reputation Generative...CSIRO National AI Centre
At the recent Generative AI Conference - This talk defined deepfakes and the widespread damage misinformation can cause. In order to build awareness of the ethical implications of deepfakes. At the
National AI Centre, Responsible AI and Responsible AI Network
allows us to action a way to use AI that is aligned to Australia's AI ethics principles.
Artificial Intelligence (AI) – Two Paths to ISO CompliancePECB
Although the Security Profession has always aspired to prevent adverse events, we have found ourselves stymied in the world of Reactive Detection—the path most commonly taken in one’s pursuit of ISO compliance. Our webinar will explore the new emerging paradigm Artificial Intelligence (AI) and what it portends for the future.
Main points covered:
• Security Profession always aspired to be Proactive, but found ourselves stymied in the World of the Reactive.
• Traditional boundaries of interest are growing ever more porous, exacerbated by the exponential growth of the IoT.
• With the advance of AI we now have a choice: remain ensconced in the paradigms of the past or evolve to the new proactive paradigm which AI portends.
Presenter:
John McClurg serves as Vice President and Ambassador-At-Large of Cylance, where he is responsible for building Security and Trust programs & operational excellence efforts. Prior to Cylance, he served as the CSO of Dell, Honeywell, and Lucent and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation (FBI). He also served as a Deputy Branch Chief of CIA where he helped to establish the new Counterespionage Group and was responsible for the management of complex counterespionage investigations. McClurg was voted one of America’s 25 most influential security professionals.
Link of the recorded session published on YouTube: https://youtu.be/D76BXU15fCY
Like electricity or the steam engine, Artificial Intelligence (AI) is a true general purpose technology: It can be used to drive economic gains, but also to project hard and soft power. Its widespread adoption will irrevocably change the international order as its effects on welfare, trade and defense transcend national boundaries.
In this keynote speech, Simon Mueller, Expert on AI Governance and Executive Director of the AI Initiative of The Future Society, will provide perspective on the range of issues, speak about current dynamics and discuss options to address emerging challenges.
Goals, Risks and Countermeasures in the Artificial Intelligence EraGabriele Graffieti
In the last decade, Artificial intelligence (AI) has definitely transformed our society, making us deeply affected by its development and the services that AI provides to us. But who owns and control AI? What are the major risks associated to it? How institutions could intervene to avoid that such an important technology will be in the hands of few individuals?
In this talk we'll explore the major technological, ethical and social risks that can be associated with an incorrect development of AI, and some countermeasures in order to avoid such risks. After that we'll discuss some examples and projects of AI used as a technology at the service of people.
Have we poisoned the internet for good?Yoav Aviram
Have we poisoned the Internet for good? It is time to take a long hard look at where we have ended up, and consider whether the Internet does more harm than good, in terms of our quality of life.
Video: https://www.youtube.com/watch?time_continue=763&v=q5x7njMMugw
Merit Event - Closing the Back Door in Your Systemsmeritnorthwest
Loss of critical documents and data, via the back-door, is the the biggest threat to many organisations today, big and small, yet has been almost entirley neglected until now".
Barry James, the UK’s leading expert in the emerging field of mobile applications and endpoint security, will explore the emerging threat and explain the remedies available.
A vast network of investigative reporters collaborated on a global scale to dive into the financial documents known as the Panama Papers. It took months to sift through the 11.5 million leaked documents. We’ll look at how the data were organized, how such a large, global project was kept secret, and get insights into how reporters started shaping their ongoing stories.
Cyber is one of our areas that we also promote in Must HighTech Expo. We invite you to participate in our virtual exhibitions, on different high tech thematic and especially on cybersecurity.
The future of marketing isn't Big Data & AI, it's not yet another social media network or some magic technology. The future of marketing is about problem solving, critical thinking, creativity, a sense of ethics and all those irreproducible things that makes us unique and human.
Watch the full presentation on YouTube: https://youtu.be/RhN3kv_-Llw
The Elasticity of Analytics Ethics - WaW Copenhagen, August 2020Stéphane Hamel
Stéphane challenges what we take for granted and shares real-life examples of questionable ethics and malpractice which will hopefully make you think about your own red line, as a marketer, an analyst and a consumer.
The Doomsday Upon Us, Marketing Festival, Prague, March 2019Stéphane Hamel
Is marketing "the activity, set of institutions, and processes for creating, communicating, delivering, and exchanging offerings that have value for customers, clients, partners, and society at large" or, thanks to data, machine learning & AI, has it crossed the fine line of manipulating audiences for the benefit of the few?
The elasticity of marketing & analytics ethicsStéphane Hamel
Stéphane is a veteran of Superweek and each year he brings a forward-looking topic which challenges the way we do our work - he brought us his famous digital analytics maturity model and the radical analytics manifesto, and last year he scared the sh*t out of us by demonstrating how machine learning could be leading us closer to an impeding doomsday. This year, Stéphane will continue where he left last year and dig into real-life examples of questionable ethics and malpractice which will hopefully make you think about your limits and where the red line is for you, as an analyst and as a consumer.
Radical Analytics, Web à Québec, Mars 2017 (français)Stéphane Hamel
« Marketing strategy », « Big Data », « digital analytics », Internet des Objets… en voulez-vous du data, en v’là! En principe, l’analytique devrait permettre aux gestionnaires marketing et autres de prendre des décisions plus éclairées. Pourtant, après des années à définir des objectifs et des indicateurs de performance, à mesurer, à produire des rapports et des tableaux de bord, la majorité des entreprises tirent le diable par la queue. Peut-être est-ce le temps de changer notre façon de faire?
Info complémentaires: https://bit.ly/radicalanalytics
Radical Analytics, Superweek Hungary, January 2017Stéphane Hamel
We have been doing it all wrong… the idea was to gather business requirements from stakeholders, define KPIs, and create a solution design. The thing is… either your stakeholders (if client side) or clients (if agency) do not have a clue or they do not know how to properly articulate their needs. Do not ask them!
Instead, take the lead - be the expert; Show them the light; pave the way!
In this presentation, Stéphane Hamel, a recognized industry leader and author of the Digital Analytics Maturity Model, will propose a radical new approach to digital analytics. He will share tricks and examples that could transform the way you do your job. Utopia or Nirvana? It will be yours to decide!
If you believe web analytics means defining objectives, reporting on KPIs, seeking executive buy-in, and embracing a data-driven culture, your ROI is likely sneaking out the back door. If you hope to dive into an ocean of data and find that one golden nugget of wisdom that will transform the organization, good luck.
Mainstream web analytics are dead. It’s time to get radical!
Naitre et Grandir - Enhanced eCommerce for MediaStéphane Hamel
In this project, we implemented Google Analytics Enhanced Ecommerce features to better understand audience interests, engagement and readership levels for a content-rich, non-profit website.
---
The client, Naître et Grandir, is funded and published by the Fondation Lucie et André Chagnon, a Quebec philanthropic society whose mission is to prevent poverty.
Naître et Grandir mission is to support Quebec parents in their role, from conception to 5 years with reliable source of information and scientifically validated content.
They are independent in regards to its content and has no profit objective or commercial interests. In this context, we considered articles to be their "products" - a powerful way to measure and demonstrate the value they offer to their audience.
A contrarian view of Tag Management SystemsStéphane Hamel
Presented at eMetrics San Francisco 2015.
While everyone believe Tag Management Systems are the next best thing since sliced bread (at least, TMS vendors believe so!), I offer a different point of view based on my own experience and feedback gleaned from clients and consultants.
Measuring your Organization's Digital Analytics MaturityStéphane Hamel
Presented at the eMetrics Marketing Optimization Summit, Boston, fall 2013.
- Definitions of analytics & analysis
- How a "model" can help
- Six critical process areas to win at digital analytics
- Benchmark
- Real-life example
- Homework :)
More info at http://DigitalAnalyticsMaturity.org
Big Data: What it means for the future of the digital analystStéphane Hamel
eMetrics Toronto presentation - 2013/03/20. Some Big Data concepts and how they can reasonably be applied today (and in the future) by digital analysts.
10 years of hard learned analytics wisdom in 20 minutesStéphane Hamel
eMetrics Tour 2013 - sharing concepts and lessons learned about developing and growing a data-driven culture and the importance of digital analytics within the organization.
Mythbusting Google Analytics - debunking a few myths about Google Analytics, supported by market research and concluding with an intro of the Online Analytics Maturity Model.
eMetrics Industry Insight (Washington D.C., 081020)Stéphane Hamel
Web Analytics vendors market shares for a random sampling of 120,000 web sites as well as the Top 500 Online Retail sites in the US.
View accompanying comments at http://blog.immeria.net/2008/10/wasp-market-research-top-500-online.html
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
31. Such powerful tools
also bring with them
new questions and
responsibilities.
Sergey Brin, Apr. 2018
32. AI is a fundamental
existential risk for
human civilization and
I don’t think people
fully appreciate that.
Elon Musk, Jul. 2017
33. I want to call attention
to the mortal danger
facing open societies
from the instruments
of control that machine
learning and artificial
intelligence can put in
the hands of repressive
regimes.
George Soros, World Economic
Forum, Jan. 2019
34. Cyber war as begun.
Florence Parly, France Defense
Secretary, Jan. 2019
35. Technology could result
in a new world war.
As a technical company,
don't be evil is not
enough.
Jack Ma, World Economic
Forum, Jan. 2019
44. Artificial Ignorance
• Virtual cannibalism
• Racist and sexist monster
• Destroying the competition
• Facebook chatbots shut down after developing their own language
• Face ID beat by a mask
• Alexa partying while owner was out
• Google Home Minis spied on their owners
• Facebook allowed ads to be targeted to "Jew Haters”
46. “man is shot dead in
front of his screaming
wife.”
“a person is holding an
umbrella in the air.”
47. “man killed by speeding
driver.”
“a close up of a
wedding cake on a
table.”
Editor's Notes
I’m so glad to be here again for our annual group therapy!
Background movie: https://www.videvo.net/video/fire-background-effect/1179/
Font: https://www.fontspace.com/chequered-ink/enter-the-harbinger
On my first visit I shared the Digital Analytics Maturity Model because I was tired of seeing my clients and agencies having unrealistic expectations about their capabilities.
Next came the Radical Analytics Manifesto – I thought there were systemic problems in the way we’ve been doing analytics.
After skipping a year, here I am to share my thoughts about the doomsday upon us.
No, no, I’m not talking about #Brexit or #Trump…
Let’s face it - marketers played with their toys for 10 to 15 years – they despised IT while they enjoyed accessing nice 3D pie-charts showing without a shadow of a doubt how fantastic they were.
The first time they had been so excited was when the BLINK HTML tag was introduced!
Source:
http://www.ymex.se/stat-adv/
https://www.lexiconn.com/ecommerce/shopsite/urchin.html
Web analytics followed the path of the Web Master.
It was democratized.
Everybody and their dog jumped on the bandwagon.
Who in his right mind wouldn’t want to be data driven, right?
Of course everybody was complaining because complaining is just part of the job definition.
Marketers claimed loud and clear how THEY were so smart, how THEY were so brilliant and destined to spend more on technology than any CIO or CTO and eventually take the CEO seat.
Big Data was fun for a while, but it was all about the technology. Machine Learning and AI is the new craze - that’s the real thing!
Source:
http://www.ymex.se/stat-adv/
https://www.lexiconn.com/ecommerce/shopsite/urchin.html
Ladies & gentlemen, the Sword of Damocles is over our heads.
And here’s why.
How do YOU define marketing? The best product/service for the benefits of your customers? Really?
Or maybe how to manipulate target audiences so they do what you want them to do?
Source:
Damocles is a figure featured in a single moral anecdote commonly referred to as "the Sword of Damocles", an allusion to the imminent and ever-present peril faced by those in positions of power. Damocles was an obsequious courtier in the court of Dionysius II of Syracuse, a 4th-century BC tyrant of Syracuse, Sicily. Wikipedia
Be forewarned I will include examples of data breach and tortured data.
Before we begin… I need to put on some protection.
https://www.reddit.com/r/funny/comments/8arm36/diy_foil_hat/
For ordinary people not living in our data bubble, Cambridge Analytica was the first, shocking demonstration of what happens when data is abused at scale.
Source: https://www.businessinsider.com/data-hacks-breaches-biggest-of-2018-2018-12#7-cambridge-analytica-87-million-15
https://medium.com/analytics-vidhya/analyzing-medium-posts-to-understand-impact-of-cambridge-analytica-scandal-5841f46703d6
We are all data people, we are all marketers – don’t tell me you wouldn’t have been thrilled to work for Cambridge Analytica… because you would be lying.
In reality, only 270,000 Facebook users actually installed the app “this is your digital life” but because of data sharing of friends and the network effect, Cambridge eventually got access to 87M profiles and users’ preferences and interests.
What got them isn’t the fact they collected all this data.
It’s not even the fact they used the data.
No, the real issue is people found out about it!
In a way, it’s all good until they realize they don’t have control – we’re all dependent on data just like we’re still dependent on oil to fuel our cars.
https://www.businessinsider.com/data-hacks-breaches-biggest-of-2018-2018-12#7-cambridge-analytica-87-million-15
https://medium.com/analytics-vidhya/analyzing-medium-posts-to-understand-impact-of-cambridge-analytica-scandal-5841f46703d6
https://www.adweek.com/digital/a-researchers-quiz-app-deceptively-harvested-data-for-political-research-facebook-alleges/
In fact, “data is the new oil” is just too good an analogy!
Greed often lead to unscrupulous digging on private or protected lands
The half-life of data is very short and few companies truly have plans for disposal
Once in the Big Data pipeline, traceability is often impossible
The primary purpose of data collection is quickly forgotten in favor of analysis bi-products
And at a global level, just like oil, data is controlled and processed by an oligarchy
Image: https://www.carbonbrief.org/analysis-decc-budget-details-show-limited-scope-for-cuts/stock-oil-refinery-night-uk-scotland
As a consumer, when will you say “that’s enough”!
Let me ask you – are you using an ad blocker?
As a digital marketer and analyst, what would be YOUR limit?
Let’s look at a few examples.
Home assistants are invading our daily lives – a goldmine largely awaiting to be dug by marketers. They are super handy, they save time and literally transform our daily routines.
https://www.chicoer.com/2019/01/22/it-was-five-minutes-of-sheer-terror-hackers-infiltrate-east-bay-familys-nest-surveillance-camera-send-warning-of-incoming-north-korea-missile-attack/
https://9to5google.com/2019/01/23/nest-cam-hack-nuclear-missile-password/
But when hackers take control, it’s not as fun anymore.
In this case, Google argue Nest itself didn’t really get hacked – it was just a case of bad password…
I told my wife a home assistant would never set foot in our house – only to realize my Sony Bravia TV has built-in Android and its assistant is enabled by default and super easy to use…
https://www.chicoer.com/2019/01/22/it-was-five-minutes-of-sheer-terror-hackers-infiltrate-east-bay-familys-nest-surveillance-camera-send-warning-of-incoming-north-korea-missile-attack/
https://9to5google.com/2019/01/23/nest-cam-hack-nuclear-missile-password/
Vendors attitude is the same as if car manufacturers would have sit tight and witnessed people crash without ever thinking about seatbelts and airbags and said “he drove into a post, that’s his fault”.
Speaking of cars…
It is estimated that 98% of new vehicles will be connected through cellular networks by 2020.
“Security bugs and vulnerabilities to hackers increase with direct relation to lines of code. A Boeing Dreamliner has 15 million lines. A contemporary premium car has 100 million. An autonomous car has more than 300 million.”
Will you trust you car?
https://www.automobilemag.com/news/car-hacking-we-hack-autonomous-car/
Another example.
Smart home devices generates tons of data and are largely unexploited by marketers. They are definitely more expensive to buy then their older “dumb” versions – but who doesn’t want to save a few bucks by remotely lowering the temperature in the living room? Who doesn’t want to have the perfect shower temperature – every single time. The perfect toasts, the perfect brew of coffee?
Call me old school – but tipping a toe in the freaking cold shower makes me feel alive. I don’t want my life to be regulated to perfection by robots and machines deciding what is good for me.
At the heart of most smart home devices is MQTT – the Message Queuing Telemetry Transport protocol. The security company Avast found tens of thousands of open MQTT servers. This means hackers can open doors, turn on/off cameras and mics, change the temperature, turn on or off lights – or turn the shower to extreme hot or cold while you are in - mostly because people haven’t changed the default admin password…
User error again!
https://www.forbes.com/sites/thomasbrewster/2018/05/24/z-wave-hack-threatens-to-expose-100-million-smart-homes/
https://www.securitysales.com/automation/smart-home/why-smart-homes-high-risk-hacked/
That’s not all - at the end of the day, smart homes devices are running code – and any code can be hacked.
This is what happen when a five-year-old flaw lies in software that's been shipped to more than 100 million devices from 2,400 different vendors that are supposed to make our homes smarter and more secure…
https://www.forbes.com/sites/thomasbrewster/2018/05/24/z-wave-hack-threatens-to-expose-100-million-smart-homes/
David Barzilai, the chairman and co-founder of three-year-old Israeli cybersecurity firm Karamba.
https://www.automobilemag.com/news/car-hacking-we-hack-autonomous-car/
The NY Times published a fascinating article which demonstrates how oftentimes it’s not even hacked – we just give it away!
Of course, there are ways to strengthen your privacy… if you find the way! User problem again!
The 235 million locations data points they captured from more than 1.2 million unique devices during a three-day period in was the playground any of us would have loved to play into.
https://www.nytimes.com/interactive/2018/12/10/business/location-data-privacy-apps.html
For example, at least 75 companies receive anonymous, precise location data from apps whose users enable location services to get local news, weather or other information.
Those businesses claim to track up to 200 million mobile devices in the United States only.
So a car pulls up near a school at 7:30am
The anonymous mobile device enters the playground.
Google’s Android system was found to have about 1,200 apps with such code, compared with about 200 on Apple’s iOS.
A single library which offers location-gathering code is used in more than 500 apps.
The device – presumably a child or a teacher, enters the school at 8am and stays there until 3pm.
And more than 40 other devices come here every weekdays and can be traced back to their respective homes.
Imagine the same for nuclear plants, or churches and such.
So what’s the problem?
Here are the most common self-justifications we hear.
Let’s be blunt and stop lying to ourselves.
Every organization will be breached eventually.
You will be breached.
You, as an individual, will be have your data breached and abused.
You, as an analyst, might think you are merely a cog in the wheel – you are doing nothing wrong, but you are contributing to the Devil’s work.
Source: http://krowdthink.com/
Those numbers are from Breach Level Index .com – they track data breaches. You want more examples?
British Airways, A criminal hack affecting bookings made on the airline's website and app. 380,000 card payments were affected.
Orbitz, Hackers accessed travel bookings in the website's system and got 880,000 payment card information and personal data such as billing addresses, phone numbers, and emails.
T-Mobile, An international group of hackers accessed T-Mobile servers through an API and got about 2 million encrypted passwords and personal data, including account numbers, billing information, and email addresses.
myPersonality. The app mishandled it’s 4M Facebook user data by sharing information with researchers as well as companies with only limited protections in place.
Saks and Lord & Taylor. A hacking group called JokerStash put up for sale more than 5 million stolen credit and debit cards.
Cathay Pacific. 860,000 passport numbers.
Careem. 14M names, emails, phone and trip data.
Timehop. 21 millions
Ticketfly. 27 millions
Facebook. 29 millions “highly sensible personal data”
Google+. 52.5 millions
MyHeritage. 92M email addresses – and they offer DNA tests…
Quora. 100M
MyFitnessPal. 150M
Exactis. An aggregator of business and consumer data - 340M – pretty much every U.S. citizen
Marriott. 500M
Aadhar. Private info on 1.1B India residents including names, government ID, and connected services such as banks.
Source:
https://www.businessinsider.com/data-hacks-breaches-biggest-of-2018-2018-12
https://www.cbronline.com/news/global-data-breaches-2018
https://breachlevelindex.com/
https://cybermap.kaspersky.com/
We’ve just started the year and there’s already a big data breach.
https://www.exchange4media.com/digital-news/772-million-email-addresses-and-21-million-passwords-exposed-in-major-data-breach-94081.html
https://www.mediapost.com/publications/article/330689/the-years-first-data-leak-horror-772-million-ema.html
https://www.troyhunt.com/the-773-million-record-collection-1-data-reach/
Here, we have a blatant example of data repurposed for a very different objective.
More than three decades after his trail went cold, one of California's most prolific serial killers and rapists was caught by using online genealogical sites to find a DNA match.
They didn’t say which genealogy site was used… but we can make a wild guess.
They didn’t say either how they got to “patient zero”.
But the Ancestry website is pretty clear about its disclosure to law enforcements.
Ancestry Guide for Law EnforcementContents of communications and any data relating to the DNA of an Ancestry user will be released only pursuant to a valid search warrant from a government agency with proper jurisdiction.
United States law (the Genetic Information Nondiscrimination Act or “GINA”) generally makes it illegal for health insurance companies, group health plans, and most employers to discriminate against you based on your genetic information.
Imagine the numerous ways in which this data could be abused!
https://www.cbc.ca/news/world/dna-from-genealogy-site-used-to-catch-suspected-golden-state-killer-1.4637726
http://catlab.psy.vanderbilt.edu/palmeri/genealogy/tag/dna/
https://www.ancestry.ca/cs/legal/lawenforcement
Some things might sound like conspiracy theories. Like this hypothesis the #10yearschallenge would be a way to train facial recognition algorithm.
Some would argue they don’t even need this – and of course, Facebook denied initiating this meme. But hey! It wouldn’t be the first time Facebook does some social engineering would it be?
A Wired article makes the point that thousands of people are voluntarily sharing two pictures, exactly 10 years apart, confirm their authenticity, and often provide additional context – in fact, just like Greg talked for Google Images indexing. Bogus pictures can easily be discarded with the existing level of image recognition.
This more intelligent algorithm could be used to, say, age the picture of a child who has been abducted, or use it in ad displays that incorporate cameras or sensors and can adapt their message for age-group demographics and other visually recognizable characteristics and context. In fact, in China, vending machines can detect gender, age, weight, and even if your skin is dehydrated – all for the “good” purpose of offering you the best product.
But what if insurance companies could detect you are aging faster than your cohort. Or as was the case in Orlando when police started using facial recognition from Amazon to track people who are suspected of having committed a crime, but soon realized they were at the same time tracking everyone – such as in “anyone protesting or whom they deemed an annoyance”…
The thing is - you know what? It doesn’t matter if it’s a conspiracy theory – if it’s fake news – because it’s plausible and all the technology is available to do it today.
https://www.wired.com/story/facebook-10-year-meme-challenge/
And some of the most influential people are raising a flag…
https://www.digitaltrends.com/cool-tech/smart-city-security-breaches-could-be-lethal/
Am I worried? You bet I am – and I’m not alone – and you should be too.
https://www.wired.com/story/mortal-danger-chinas-push-into-ai/
https://www.wired.com/story/elon-forget-killer-robots-focus-on-the-real-ai-problems/
https://www.macobserver.com/news/french-defence-secretary-cyber-war-has-begun/
https://www.freshplaza.com/article/9065522/alibaba-s-jack-ma-technology-could-result-in-a-new-world-war/
The last statement from Jack Ma is particularly interesting considering Alibaba’s involvement in the social credit system in China.
This isn’t a Black Mirror episode!
China’s social rating has begun, and it’s an inspiring idea for other questionable country leaders, like Venezuela for example.
In a year from now, every footstep, keystroke, like, dislike, social media contact, and posting will potentially affect social ratings.
Personal “creditworthiness” or “trustworthiness” points will be used to reward and punish individuals and companies by granting or denying them access to public services like health care, travel, and employment.
High-scoring individuals will find themselves in a “green channel,” where they can more easily access social opportunities, while those who take actions that are disapproved by the state will be “unable to move a step.”
Creepy? Yet, for having spoken with some people in China, they see benefits in this system – it will make better citizens - or they didn’t tell the truth because they knew they were being monitored!
So, I’m asking again: where’s the limit on data collection and doing things for the ”benefits” of consumers and citizens? Where is YOUR limit?
Here’s a couple more interesting examples.
https://www.wired.com/story/is-big-tech-merging-with-big-brother-kinda-looks-like-it/
https://www.wsj.com/video/in-china-using-big-data-as-big-brother/EFE6FB1C-FDC5-4EA5-B7D8-164FD41F7DD2.html
https://www.wired.com/story/age-of-social-credit/
At Google IO this year, Google Duplex clearly demonstrated the extent of voice recognition and synthesis.
So much that some people said this passes the Turing Test – were it’s impossible to distinguish this is a non-human interaction.
Of course, Google said the AI would disclose itself… yeah… right… maybe Google will, but others won’t.
So this can be used for good, but also for evil.
Image: https://www.engadget.com/2018/05/10/google-duplex-ai-identification/
Video: https://www.youtube.com/watch?v=D5VN56jQMWM
Lyrebird is one of many who are working on realistic voice synthesis – the first sample sounds robotic, but I would challenge anyone to say the last one isn’t real. https://lyrebird.ai/custom-voice
Another company, Nuance, who’s been in the voice business for a very long time, say they can use voice biometrics to authenticate people.
There’s just one little problem… they got hit by hackers… twice… the first time it impacted the transcription service of their healthcare customers – bah… what could be the consequence, right?
The 2nd time the hackers managed to put their hands on 45,000 customer records… but there were no indications if those records included voice signature too. Hello voice authentication!
Making computers sound and respond like humans is here today. Imagine making them look like humans as well.
Image: https://www.freepik.com/free-vector/colored-background-abstract-sound-wave_1112283.htm
https://www.healthcareitnews.com/news/hackers-hit-nuance-again-2017-while-notpetya-cost-98-million-lost-revenue
Worrying? A professor from the University of Washington who worked on this kind of deepfake said “every technology can be used in some negative way and so we all should work towards making sure it’s not going to happen”.
That’s often the justification – everybody does it, it’s already there, I have nothing to hide, anything can be used for good or evil.
To be honest, there are counter measures that are able to detect artificial voices and altered videos and pictures. But still…
----
Enter Artificial Intelligence (AI) and what is known as “deepfake” videos. The term “deepfake” is a synthesis of two words: deep learning and fake. Deep learning allows AI to understand things about you, like your face and body, from readily available images and video. Using a machine-learning technique called a Generative Adversarial Network (GAN), you only need to combine the source video and imagery into a targeted video to be used for the fake.
Deepfakes are a recent phenomenon, emerging in 2017 as a threat initially involving the porn industry; unfortunately, Hollywood actresses like Scarlett Johansson were too easy of a target for deepfake porn videos. By the very nature of her work, there is a tremendous number of images and hundreds of hours of video with which to work. The result is a product that soon will be indistinguishable from the real thing. But this is only the beginning.
This escalation has gotten the attention of our Department of Defense, specifically the Defense Advanced Research Projects Agency (DARPA). They’ve even been holding contests to create the best deepfake videos on the planet in order to test their new tools for ferreting out AI-generated photos, videos and even audio recordings.
Video: https://youtu.be/cQ54GDm1eL0
https://thehill.com/opinion/technology/426536-the-age-of-deepfake-when-seeing-is-no-longer-necessarily-believing
Ex-Reddit CEO came out of the closet and said it in plain text:
Take something as seemingly simple as how we measure web traffic. Metrics should be the most real thing on the internet: They are countable, trackable, and verifiable, and their existence undergirds the advertising business that drives our biggest social and search platforms. Yet not even Facebook, the world’s greatest data–gathering organization, seems able to produce genuine figures.
A single busted Chinese clickfarm had 10,000 phones. In another bust, 400,000 SIM cards were confiscated.
Welcome to the century of fake-everything!
https://www.zerohedge.com/news/2018-12-27/everything-fake-ex-reddit-ceo-confirms-internet-traffic-metrics-are-bullshit
https://kotaku.com/inside-chinese-click-farms-1795287821
https://www.asiaone.com/asia/thai-police-bust-chinese-click-farm-seize-400000-sim-cards
Image: http://nymag.com/intelligencer/2018/12/how-much-of-the-internet-is-fake.html
Beyond the legal aspects of GDPR, beyond the human errors, and corporate greed, there needs to be a sense of dignity and ethics.
Montreal as become a hub for artificial intelligence and they published the Montréal Declaration of Responsible AI – I think we should look into and embrace its principles.
Well-being: The development and use of artificial-intelligence systems (AIS) must permit the growth of the well-being of all sentient beings.
Respect for autonomy: AIS must be developed and used with respect for people’s autonomy, and with the goal of increasing people’s control over their lives and their surroundings.
Protection of privacy and intimacy: Privacy and intimacy must be protected from intrusion by AIS and by data-acquisition and archiving systems.
Solidarity: The development of AIS must be compatible with maintaining the bonds of solidarity among people and generations.
Democratic participation: AIS must meet intelligibility, justifiability and accessibility criteria, and must be subjected to democratic scrutiny, debate and control.
Equity: The development and use of AIS must contribute to the creation of a just and equitable society.
Diversity inclusion: The development and use of AIS must be compatible with maintaining social and cultural diversity, and must not restrict the scope of lifestyle choices and personal experience.
Prudence: Every person involved in AIS development must exercise caution by anticipating, as far as possible, the potential adverse consequences of AIS use, and by taking appropriate measures to avoid them.
Responsibility: The development and use of AIS must not contribute to diminishing the responsibility of human beings when decisions must be made.
Sustainable development: The development and use of AIS must be carried out so as to ensure strong environmental sustainability of the planet.
https://www.montrealdeclaration-responsibleai.com/the-declaration
Remember, it’s not because it’s a conspiracy theory that it can’t be done or it isn’t true…
I’m Stéphane Hamel, and data is the raw material of my craft.
Virtual cannibalism: For one simulation, we had two agents, naturally enough named Adam and Eve. Another agent was Stan, who wanted to be social but wasn’t very good at it, so was often hanging around and kind of lonely. If they experienced hunger around the time they saw Stan, they’d learn to associate food around the time they saw Stan. After a while… once they had eaten all the apples, they hate Stan. That was in the early 2000s.
Racist and sexist monster: In 2016, Microsoft launched Tay.ai – a chatbot hidden behind the avatar of a 19-year-old girl. Tay was able to handle a variety of tasks; joking with users, commenting pictures, telling stories, playing games, and mirroring users’ statements back to them. One of the first things online users taught Tay was how to make offensive and racist statements. They had to shut her down after 16 hours.
Destroying the competition: robots were trained to herd more sheep into a virtual pen than their competing robots. One robot get a single sheep in the pen and shot the door – than turned around and killed all the other bots… It strategized that it didn’t actually need to be good at herding sheep, it only needed to eliminate the competition in order to win.
Facebook chatbots shut down after developing their own language: Facebook researchers found out that Alice and Bob had developed their own secret language and were carrying on conversations with each other. While the conversation transcript looks harmless, the researches wanted the bots to chat with humans but they had found a way to be more efficient than us, mere mortals… Alice and Bob were shut down after their conversations were discovered.
Face ID beat by a mask: A week after the release of the iPhone X, hackers had gotten around the phone's signature Face ID facial recognition system. Using a 3D-printed, the iPhone X thought it was a human, and unlocked the phone.
Alexa partying while owner was out: German police broke into an apartment after neighbors reported loud music early in the morning. The cause? Not a party, but an Amazon Echo randomly blasting music when the resident was out.
Google Home Minis spied on their owners: security researchers discovered that some Google Home Minis had been secretly turning on, recording thousands of minutes of audio of their owners, and sending the files to Google. After noticing that his digital assistant had been turning on and trying to listen to the TV, one user checked Google's My Activity portal, where he found out the device had been recording him.
Facebook allowed ads to be targeted to "Jew Haters”: Using Facebook's AI-driven, self-service platform to purchase ads, companies and brands can target their message to different demographics. Some of those demographics were created by an algorithm, not a human...
https://blog.statsbot.co/creepy-artificial-intelligence-ebc3f76179a8
https://www.techrepublic.com/article/the-10-biggest-ai-failures-of-2017/
The Rorschach test is a psychological test in which subjects' perceptions of inkblots are recorded and then analyzed using psychological interpretation.
So what might possibly happen if we ask AI to interpret those?
https://en.wikipedia.org/wiki/Rorschach_test
In fact, the world's first psychopath AI is born from the fact that the data that is used to teach a machine learning algorithm can significantly influence its behavior.
http://norman-ai.mit.edu/
Let’s look at another one.
Now transpose this to something else.