Remove Blog Remove Data collection Remove Surveillance Remove Technology
article thumbnail

On Surveillance in the Workplace

Schneier on Security

Gamification and algorithmic management of work activities through continuous data collection. In a blog post about this report, Cory Doctorow mentioned "the adoption curve for oppressive technology, which goes, 'refugee, immigrant, prisoner, mental patient, children, welfare recipient, blue collar worker, white collar worker.'"

article thumbnail

Privacy issues in smart cities – Lessons learned from the Waterfront Toronto – Sidewalks project

Privacy and Cybersecurity Law

Risk #1: Surveillance both from the State and surveillance capitalism. Digital solutions generally create the risk of law enforcement access to the data they collect. Capitalist surveillance particularly arose around the Quayside project because of the link to Alphabet and Google. Risk # 5: Data Monetization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

PRIVACY ISSUES IN SMART CITIES – LESSSONS LEARNED FROM THE WATERFRONT TORONTO – SIDEWALKS PROJECT

Privacy and Cybersecurity Law

Risk #1: Surveillance both from the State and surveillance capitalism. Digital solutions generally create the risk of law enforcement access to the data they collect. Capitalist surveillance particularly arose around the Quayside project because of the link to Alphabet and Google. Risk # 5: Data Monetization.

article thumbnail

MY TAKE: Even Google CEO Sundar Pichai agrees that it is imperative to embed ethics into AI

The Last Watchdog

Either way, a singular piece of technology – artificial intelligence (AI) — is destined to profoundly influence which way we go from here. Law enforcement, for instance, drew criticism for using a controversial facial recognition app — Clearview AI — to surveil citizens turning out to protest the George Floyd murder.

article thumbnail

A chink in the armor of China-based hacking group Nickel

Malwarebytes

As a result, Nickel achieved long-term access to several targets, allowing the group to conduct activities such as regularly scheduled exfiltration of data. Microsoft Threat Intelligence Center (MSTIC) observed Nickel perform frequent and scheduled data collection and exfiltration from victim networks. International cooperation.

Hacking 97
article thumbnail

Microsoft disrupts China-based hacking group Nickel

Malwarebytes

As a result, Nickel achieved long-term access to several targets, allowing the group to conduct activities such as regularly scheduled exfiltration of data. Microsoft Threat Intelligence Center (MSTIC) observed Nickel perform frequent and scheduled data collection and exfiltration from victim networks. International cooperation.

Hacking 77
article thumbnail

Knock, Knock; Who’s There? – IoT Device Identification & Data Integrity Is No Joke

Thales Cloud Protection & Licensing

They all must have unique identifiers and the ability to collect and transfer data over networks to enable monitoring, surveillance, and execution of decisions based on the collected data with little or no human intervention. But making the IoT work requires trust in the devices and the data they collect.

IoT 72