Skip to main content

Home/ Open Intelligence / Web 3X (Social + Mobile)/ Group items matching "enforcement" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
1More

Kaspersky Calls For 'Internet Interpol' [18May11] - 0 views

  • "With cybercrime now the second largest criminal activity in the world, measures such as the creation of an 'Internet Interpol' and better cooperation between international law enforcement agencies are needed if criminals are to be curtailed in the future, Kaspersky Labs founder and security expert Eugene Kaspersky has argued. He said, 'We were talking about that 10 years ago and almost nothing has happened. Sooner or later we will have one. I am also talking about Internet passports and having an online ID. Some countries are introducing this idea, so maybe in 15 years we will all have it.'"
9More

Obama Tries to Bypass Congress with Deadly Global Internet Treaty ACTA [28Jan12] - 0 views

  • Before the American people were protesting the Stop Online Piracy Act and the Protect Intellectual Property Act, the president managed to sign an international treaty which would permit foreign companies to demand that ISPs (Internet Service Providers) remove web content in the United States without any legal oversight. Entitled the Anti-Counterfeiting Trade Agreement (ACTA), the treaty was signed by Obama on October 1, 2011, but it is currently a subject of discussion because the White House is circulating a petition demanding that senators ratify the treaty.
  • the White House has done some maneuvering — characterizing the treaty as an "executive agreement" — thereby bypassing approval by members of Congress. Concerned by this action of the administration, Sen. Ron Wyden (D-Ore., above left) sent a letter to President Obama in which he declared: It may be possible for the U.S. to implement ACTA or any other trade agreement, once validly entered, without legislation if the agreement requires no change in U.S. law. But regardless of whether the agreement requires changes in U.S. law ... the executive branch lacks constitutional authority to enter a binding international agreement covering issues delegated by the Constitution to Congress' authority, absent congressional approval.
  • Similarly, TechDirt observes: ... [E]ven if Obama has declared ACTA an executive agreement (while those in Europe insist that it’s a binding treaty), there is a very real Constitutional question here: can it actually be an executive agreement? The law is clear that the only things that can be covered by executive agreements are things that involve items that are solely under the President’s mandate. That is, you can’t sign an executive agreement that impacts the things Congress has control over. But here’s the thing: intellectual property, in Article 1, Section 8 of the Constitution, is an issue given to Congress, not the President. Thus, there’s a pretty strong argument that the President legally cannot sign any intellectual property agreements as an executive agreement and, instead, must submit them to the Senate.
  • ...6 more annotations...
  • Twenty-two EU member states signed the treaty at a ceremony in Tokyo on January 26. Other nations interested in signing the agreement have until May 2013 to do so. According to Wikipedia, the Anti-Counterfeiting Trade Agreement “creates a governing body outside national institutions such as the World Trade Organization (WTO), the World Intellectual Property Organization (WIPO) or the United Nations.” The scope of the agreement includes counterfeit goods, generic medicines, and pirated copyright-protected works.
  • The provisions of ACTA grant copyright holders direct powers to demand that ISPs remove material from the Internet, without the requirement of a court order, and permit foreign influence over ISPs in the United States. Advocates of the treaty seek to give copyright holders the ability to demand that users who do violate intellectual property rights have their Internet connections terminated as a punishment. To enforce such a system would require the creation of an individual Internet ID.
  • The Electronic Frontier Foundation (EFF) reports: The same industry rightsholder groups that support the creation of ACTA have also called for mandatory network-level filtering by Internet Service Providers and for Internet Service Providers to terminate citizens’ Internet connection on repeat allegation of copyright infringement (the “Three Strikes”/Graduated Response) so there is reason to believe that ACTA will seek to increase intermediary liability and require these things of Internet Service Providers.
  • The EFF has been vehement in its opposition to ACTA, particularly regarding the secrecy surrounding the treaty negotiations. Likewise, Michael Geist, in writing for Copyright News, asserted that ACTA was “shrouded in secrecy.” He pointed out that ACTA negotiations did not include civil society groups or developing countries, noting also that “reports suggest that trade negotiators have been required to sign non-disclosure agreements for fear of word of the treaty’s provisions leaking to the public.” The European Commission denied this allegations in 2008, arguing, “It is only natural that intergovernmental negotiations dealing with issues that have an economic impact, do not take place in public and that negotiators are bound by a certain level of discretion.”
  • As noted on Wikipedia, opponents of ACTA also assert that it will impinge upon freedom of expression and communication privacy. A large number of the World Trade Organization’s 157 members have voiced concerns that the treaty would have a negative impact on trade. Others have pointed out that ACTA does not include provisions for legal safeguards protecting ISPs from liability for the actions of their subscribers. Without such provisions, ISPs will be forced to invade the privacy of their subscribers in order to protect themselves. Aaron Shaw, research fellow at the Berkman Center for Internet & Society at Harvard University, stressed that “ACTA would create unduly harsh legal standards that do not reflect contemporary principles of democratic government, free market exchange, or civil liberties.”
  • The technology news and information website ArsTechnica.com argues that ACTA encourages ISPs to collect and provide information about suspects by providing for those ISPs “safe harbor from certain legal threats.” In protest against the treaty, the hacktivist group Anonymous hacked into the Federal Trade Commission’s cybersecurity advice website on January 24, replacing the homepage with the Anonymous logo, a rap song, and a message threatening more attacks if anti-piracy legislation in Congress were to pass. According to The Next Web: The message left temporarily on OnGuardOnline referred to the Stop Online Piracy Act, The Protect Intellectual Property Act and the Anti-Counterfeiting Trade Agreement. If they pass, the message said, "we will wage a relentless war against the corporate Internet, destroying dozens upon dozens of government and company websites."
8More

PayPal: Mobile payments and location-based offers go hand-in-hand - Tech News and Analysis - 0 views

  • As we have been reporting, PayPal is gearing up to launch an in-store payment system that will compete with Google Wallet, Isis, Square and others. But the company isn’t just building out a point-of-sale transaction network. It’s looking to engage consumers well before they set foot in a store.
  • Walt Doyle, the CEO of WHERE, which was acquired by PayPal last year, said that will be a key battleground in mobile payments, pulling in consumers off the street. WHERE, which operates a location-based ad network, will be used as a way for merchants and retailers to engage consumers with deals and offers and lure them into stores, where they can check out using PayPal’s upcoming payment system. Doyle told me in an interview that the system will make mobile payments interesting to both consumers and merchants.
  • “If you only enforce payments without content advertising or offers, it’s simply not compelling from the acceptance side or from the consumer side,” Doyle said.
  • ...5 more annotations...
  • WHERE is able to target consumers based on a variety of factors including location but also search and purchase data. The goal is to be able to find nearby users and walk them into a store so they will buy a product based on an offer or deal. That will allow PayPal to close the redemption loop and show merchants how much business they are getting from PayPal, Doyle said.
  • We talked about the potential of offering local deals when PayPal bought WHERE. But it is interesting to see that PayPal considers WHERE a key tool in its larger mobile payments efforts. It’s not surprising, considering Google Wallet is being combined with Google Offers, but it shows that this is becoming table stakes in mobile payments. You can’t just have a great payment solution; you also need to have marketing and outreach tools to distinguish yourself from other offerings. And you need to provide merchants with more benefits than just an alternative to a card swipe. Having a way for merchants and retailers to grab people off the street is going to be key for successful payment systems. And putting coupons and deals in the hands of consumers can help convince them that it makes sense to use an alternative to credit cards or cash.
  • One of the problems I see, however, is that with WHERE there is no guarantee that consumers must pay via PayPal at the point of sale. A user could receive a mobile ad for a deal or coupon and then choose to pay with cash or a card, which would leave the redemption loop open. That, Doyle said, is something PayPal will be working on as it rolls out its payment system.
  • But he said this is part of the bigger challenge for all mobile payment providers. They have to provide more benefit than a card swipe to both consumers and merchants. It is going to take an ecosystem to accelerate adoption, said Doyle, and there is a lot more learning needed in the years to come.
  • “2012 in mobile payments is where location-based services were, like, three to four years ago. It’s, like, the year when things begin but it’s not where the critical adoption curve kicks in. You need consumer adoption on handsets and merchant adoption on the point of sale side. You will see it begin this year, and we will all learn a ton,” Doyle said.
13More

Visual Information Retrieval: the Next challenge in Information Management - ERM Expert... - 0 views

  • In the past 20 years, a lot of research has been done towards visual information retrieval on pictures and video files. Not all of it has been successful. But on the last years, the quality of these visual search engines has reached levels that are beginning to be acceptable for eDiscovery, compliance, law enforcement and intelligence applications.
  • More and more electronically stored information (ESI) is non-text based or does not contain any searchable text components: sound recordings, video and pictures are growing exponentially in size and more and more collaborative and social network applications support (only) these information formats.
  • In addition, a whole generation is growing up that no longer uses written communication forms such as letters or emails: they only use social networks and other new media forms for communication and collaboration.
  • ...10 more annotations...
  • Electronic files containing one of more text components or embedded objects with text components can be searched by using text-based queries.
  • Document scans (images) and even pictures can be enriched with the text of the original document or even with recognizable logo’s in the pictures. The same technology can also be applied to video shots.
  • Audio and the audio component of a video file can be processed by a phonetic search engine and users can search the content by looking for specific words or phoneme sequences.
  • In addition, audio-, pictures- and video files can be searched on contextual information such as the file name, added meta-information or text that surrounds the picture or the video on a web page.
  • Web search engines such as Google, Bing and Yahoo use primarily contextual text information from pictures and video’s to search on these object. This text can be tagged by users or can be found in the file name, file location, surrounding text on the webpage, etc. In some cases, words that are recognized in the images and videos with Optical Character Recognition (OCR) technology is used, or nudity is recognized and filtered, but that is about it. There is not or limited influence from pure visual information retrieval technology such as: give me all outdoor pictures or all images with a helicopter in it.
  • State-of-the-art visual search technology should address all of these aspects and support both text-based as image or video example based querying, result navigation and viewing.
  • Ranking images is based on complex statistics and other mathematical properties that are not always intuitive to humans.  Users need a much more exploratory and visual result list that uses all available dimensions when searching images and videos.
  • There are many use cases in the field of visual information retrieval varying from searching pictures on the internet to recognizing faces of hooligans at the entrance of a high risk football match, monitoring airports with surveillance cameras and investigating child abuse.
  • Many of these applications are highly specialized applications requiring a lot of specialized knowledge and experience to work effectively.
  • However, I expect that in the next year or five, real visual information retrieval will become a core component of in-house Enterprise Information Management systems as more and more information consists of pictures and videos that are not annotated and therefore hard to find.
1More

Bill Would Require Warrants For Govt to Access Your Email, Cloud Services [18May11] - 0 views

  • Sen. Patrick Leahy on Tuesday unveiled an overhaul to a 25-year-old digital privacy law that would require the government to obtain warrants before accesssing email and other cloud-based data. The update to the Electronic Communications Privacy Act (ECPA), would also extend to location-based data, and allow private companies to collaborate with the government in the event of a cyber attack. The ECPA was first enacted in 1986, well before the Internet, email, or smartphones. As a result, it is "significantly outdated and out-paced by rapid changes in technology and the changing mission of our law enforcement agencies after September 11," said Leahy, a Vermont Democrat. As a result, Leahy's updated 2011 version of the ECPA would apply to technologies like email, cloud services, and location data on smartphones. If the government wanted an ISP to hand over emails on a particular customer, for example, they would need to first obtain a warrant. At this point, the government abides by a rule that provides access to email after 180 days, depending on the circumstance.
7More

Scientists push to implement edible RFID tracking chips in food [03Jun11] - 0 views

  • these are some of the enticing claims made by the developers of a new system that embeds edible radio frequency identification (RFID) chips directly into food. Its creators insist the technology will revolutionize the way humans eat for the better, but critical-thinking onlookers will recognize the ploy as just another way to track and control human behavior.
  • Developed by Hannes Harms from the Royal College of Art in London, the “NutriSmart” system is based on the idea that RFID wafers injected directly into food can help better track the food supply chain, further automate the supermarket shopping experience, and simplify the eating experience by programming data into food so that humans essentially do not have to think about what they are doing.The technology makes both eating and dealing with food in general mindless, as a person simply needs to plop an RFID-embedded food item onto a special RFID-laced plate, which then tells the person all about the item and how much of it to eat. RFID ovens and microwaves also eliminate having to think about how long to cook an RFID food item — simply put it in the RFID microwave, oven, or toaster, and the machine will know exactly how long to cook the item.
  • mad scientists have already developed edible RFID tags for use in pharmaceutical drugs
  • ...3 more annotations...
  • (http://www.naturalnews.com/028663_health_care_technology.html)
  • if such technology also ends up in food, it is safe to assume that evil powers will seek to control the food supply with it, as well as monitor the types of food people eat.
  • it is plausible that RFID technology can assess illegal intake of such nutrients, and immediately send this data to the appropriate enforcement agencies.
1More

New app another tool for workers in wage disputes [21May11] - 0 views

  • Workers who don't trust the boss to keep track of their wages can now do it themselves with a new smart phone application from the Department of Labor. But employers worry that the time sheet app, along with other new initiatives, could encourage even more wage and hour lawsuits. The app lets workers calculate regular work hours, break time and overtime pay to create their own wage records. Department officials say the information could prove valuable in a dispute over pay or during a government investigation when an employer has failed to keep accurate records. "This app will help empower workers to understand and stand up for their rights when employers have denied their hard-earned pay," Labor Secretary Hilda Solis said. The app is the latest example of the Obama administration's push for more aggressive enforcement of wage and hour laws. The agency has hired about 300 more investigators to probe complaints of unpaid work time, lack of overtime pay and minimum wage violations.
2More

Newswire / Millennial Net, Inc. Receives Best Application of Wireless Sensor Networks A... - 0 views

  • “Wireless sensor networks are the enabling technology for key applications in defense, health care, home and industrial automation and energy management. Technology leaders have recognized this fact and are providing high end application solutions for their customers based on advanced WSN technology. The Millennial Net Energy Management System which includes LEM energy sub meters, wireless pneumatic thermostats and numerous other devices allow for monitoring and control of commercial, public and light industrial buildings of several hundred thousand square feet with unprecedented scalability and reliability, leading to substantial energy savings and ROIs of around 1 year,” said Dieter Schill, President and CEO of Millennial Net.
  • This gateway connects the networked devices to existing Building Management System via BACnet or communicates with hosted internet-based application for monitoring and control. The devices are designed to work with legacy HVAC systems, fixtures, and appliances, making it unnecessary to upgrade HVAC equipment to save energy. Energy savings are achieved by improved compliance and energy policy enforcement.
1 - 8 of 8
Showing 20 items per page