<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>governments Archives - Stuff South Africa</title>
	<atom:link href="https://stuff.co.za/tag/governments/feed/" rel="self" type="application/rss+xml" />
	<link>https://stuff.co.za/tag/governments/</link>
	<description>South Africa&#039;s Technology News Hub</description>
	<lastBuildDate>Fri, 01 Oct 2021 13:35:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://stuff.co.za/wp-content/uploads/2021/10/favicon-transparent-1-150x150.png</url>
	<title>governments Archives - Stuff South Africa</title>
	<link>https://stuff.co.za/tag/governments/</link>
	<width>32</width>
	<height>32</height>
</image> 
<atom:link rel="hub" href="https://pubsubhubbub.appspot.com"/>
<atom:link rel="hub" href="https://pubsubhubbub.superfeedr.com"/>
<atom:link rel="hub" href="https://websubhub.com/hub"/>
<atom:link rel="self" href="https://stuff.co.za/tag/governments/feed/"/>
	<item>
		<title>Zambia reportedly shuts down social media access during its general elections</title>
		<link>https://stuff.co.za/2021/08/13/zambia-social-media-access-elections/</link>
		
		<dc:creator><![CDATA[Brett Venter]]></dc:creator>
		<pubDate>Fri, 13 Aug 2021 08:53:03 +0000</pubDate>
				<category><![CDATA[App News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Other Tech News]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[featured]]></category>
		<category><![CDATA[general elections]]></category>
		<category><![CDATA[governments]]></category>
		<category><![CDATA[shutdown]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[Twitter]]></category>
		<category><![CDATA[WhatsApp]]></category>
		<category><![CDATA[Zambia]]></category>
		<guid isPermaLink="false">https://stuff.co.za2021/08/13/zambia-social-media-access-elections/</guid>

					<description><![CDATA[<p>Social media is a powerful thing. Whether that&#8217;s good or bad really depends on the situation but it&#8217;s powerful enough that Zambia, which yesterday conducted its general elections, was reported to have shut down the country&#8217;s access to WhatsApp, Twitter, and Facebook&#8217;s suite of apps as voting was taking place. What happened in Zambia? ⚠️ [...]</p>
<p>The post <a href="https://stuff.co.za/2021/08/13/zambia-social-media-access-elections/">Zambia reportedly shuts down social media access during its general elections</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Social media is a powerful thing. Whether that&#8217;s good or bad really depends on the situation but it&#8217;s powerful enough that Zambia, which yesterday conducted its general elections, was reported to have shut down the country&#8217;s access to WhatsApp, Twitter, and Facebook&#8217;s suite of apps as voting was taking place.</p>
<h3><strong>What happened in Zambia?</strong></h3>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">⚠️ Update: Real-time network data confirm that social media and messaging platforms including Twitter, Facebook, Instagram and Messenger are now restricted in <a href="https://twitter.com/hashtag/Zambia?src=hash&amp;ref_src=twsrc%5Etfw">#Zambia</a> on election day in addition to the earlier WhatsApp restriction <a href="https://twitter.com/hashtag/ZambiaDecides2021?src=hash&amp;ref_src=twsrc%5Etfw">#ZambiaDecides2021</a></p>
<p>📰 <a href="https://t.co/pTzmnesKzP">https://t.co/pTzmnesKzP</a> <a href="https://t.co/Nw58eCTfu8">pic.twitter.com/Nw58eCTfu8</a></p>
<p>&mdash; NetBlocks (@netblocks) <a href="https://twitter.com/netblocks/status/1425817892482818059?ref_src=twsrc%5Etfw">August 12, 2021</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>Several groups, including <a href="https://twitter.com/accessnow/status/1425836954264997888?s=20" target="_blank" rel="noopener">Access Now</a> and <a href="https://netblocks.org/reports/whatsapp-and-social-media-restricted-in-zambia-on-election-day-18lpLY8a" target="_blank" rel="noopener">NetBlocks</a>, reported that the country had blocked access to WhatsApp and other social media platforms. That the Zambian government was considering taking this step during its elections was first reported last week by the <a href="https://www.lusakatimes.com/2021/08/10/government-may-shut-down-internet-during-voting-period-malupenga/" target="_blank" rel="noopener"><em>Lusaka Times</em></a>.</p>
<p>Initially, Zambia&#8217;s government denied reports that it was considering a social media blackout, but it followed up with a statement by the country&#8217;s Information and Broadcasting Services Permanent Secretary Amos Malupenga, who ahead of the shutdown said, &#8220;Government, therefore, expects citizens to use the internet responsibly. But if some people choose to abuse the internet to mislead and misinform, Government will not hesitate to invoke relevant legal provisions to forestall any breakdown of law and order as the country passes through the election period.&#8221;</p>
<p>The Zambian government is expected to keep access to social media restricted as of yesterday, all the way through to Sunday, 15 August, when vote counting is expected to be completed. <a href="https://netblocks.org/reports/whatsapp-and-social-media-restricted-in-zambia-on-election-day-18lpLY8a" target="_blank" rel="noopener">NetBlocks explains</a> that citizens in that country can currently circumvent the block using VPN services. There have <a href="https://www.reuters.com/article/zambia-election-idAFL8N2P80RH">already been incidents of violence</a> reported before the elections kicking off. This social media shutdown might dampen some instances of further violence but it will <a href="https://stuff.co.za/2020/07/28/internet-shutdowns-in-africa-threaten-democracy-and-development/" target="_blank" rel="noopener">also make it more difficult to react</a> to possible flare-ups and let citizens move out of potentially dangerous situations.</p>
<p>The post <a href="https://stuff.co.za/2021/08/13/zambia-social-media-access-elections/">Zambia reportedly shuts down social media access during its general elections</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Moscow Metro is test-driving letting users pay for tickets using just their faces</title>
		<link>https://stuff.co.za/2021/08/06/moscow-metro-test-tickets-faces/</link>
		
		<dc:creator><![CDATA[Brett Venter]]></dc:creator>
		<pubDate>Fri, 06 Aug 2021 11:26:31 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Other Tech News]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[featured]]></category>
		<category><![CDATA[governments]]></category>
		<category><![CDATA[Moscow Metro]]></category>
		<category><![CDATA[payments]]></category>
		<category><![CDATA[smart cities]]></category>
		<guid isPermaLink="false">https://stuff.co.za2021/08/06/moscow-metro-test-tickets-faces/</guid>

					<description><![CDATA[<p>Social media has had more than a decade to prove that your face is someone else&#8217;s fortune, but the Moscow Metro is really hammering the point home. The Russian transportation agency is trialling something called FacePay on its Filevskaya metro line. FacePay, as the name suggests, is a facial recognition system that lets users pay [...]</p>
<p>The post <a href="https://stuff.co.za/2021/08/06/moscow-metro-test-tickets-faces/">The Moscow Metro is test-driving letting users pay for tickets using just their faces</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Social media has had more than a decade to prove that your face is someone else&#8217;s fortune, but the Moscow Metro is really hammering the point home. The Russian transportation agency is trialling something called FacePay <a href="https://new.mosmetro.ru/news/detail/?news=599" target="_blank" rel="noopener">on its Filevskaya metro line</a>.</p>
<p>FacePay, as the name suggests, is a facial recognition system that lets users pay for things using biometric data &#8212; specifically those chiselled (or possibly crafted-from-pudding &#8212; hey, people are all different) features you&#8217;re carting around all day.</p>
<h3><strong>Moscow Metro 2033?</strong></h3>
<p>How it works in this particular instance is that eligible users will download the Moscow Metro app, upload a photograph of themselves and then link a bank card. Then, when they hit a metro turnstile, they just stand on the marked spot (as seen in the image above) and the little camera will deduct money from their account and permit them ingress. Easy, right?</p>
<p>But it does rather rely on trusting access to your facial features to an outside entity. There are already questions about <a href="https://stuff.co.za/2021/01/21/facial-recognition-who-owns-our-faces/" target="_blank" rel="noopener">who owns your face</a> in an era where biometric information is being gathered and stored. Facial recognition is already in widespread use in China, where <a href="https://stuff.co.za/2021/07/07/tencent-midnight-patrol-facial-recognition/" target="_blank" rel="noopener">it&#8217;s currently preventing children from playing more video games</a> than the government there believes is healthy. Korea is <a href="http://www.koreaherald.com/view.php?ud=20210122000651" target="_blank" rel="noopener">conducting public transportation tests</a> when it comes to face-based payment, and Georgia already <a href="https://www.palizafzar.com/en/news/face-biometric-payments-for-subway-system-in-georgia/" target="_blank" rel="noopener">has the tech in place</a>.</p>
<p>South Africa doesn&#8217;t really have this sort of public transportation, so we&#8217;re unlikely to see a version of it any time soon. At worst, we&#8217;ll see it turn up on the Gautrain, at best it&#8217;ll one day be implemented on a (hopefully self-driving) minibus taxi &#8212; but by then it&#8217;ll be a mature technology and hopefully all the questions around it will have been worked out.</p>
<p>At the moment, it&#8217;s not known how long the Moscow Metro will keep facial data after the trial is complete and what sort of security is protecting that data. There&#8217;s also no information on whether that data will be shared with police or other law-enforcement agencies. Then there&#8217;s the question as to whether users will be permitted to opt out of using facial recognition as a payment method once it becomes more commonplace. It&#8217;s entirely possible that facial recognition will be forced on the citizens of a given country, should the technology become widespread enough. Whether it&#8217;s worth it is something to consider, before we get to that point.</p>
<p>The post <a href="https://stuff.co.za/2021/08/06/moscow-metro-test-tickets-faces/">The Moscow Metro is test-driving letting users pay for tickets using just their faces</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Artificial intelligence: governments see huge business potential, but ignore the downsides</title>
		<link>https://stuff.co.za/2021/07/22/artificial-intelligence-ignores-downsides/</link>
		
		<dc:creator><![CDATA[The Conversation]]></dc:creator>
		<pubDate>Thu, 22 Jul 2021 09:16:35 +0000</pubDate>
				<category><![CDATA[AI News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Other Tech News]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[artificial intelligence]]></category>
		<category><![CDATA[featured]]></category>
		<category><![CDATA[governments]]></category>
		<category><![CDATA[The Conversation]]></category>
		<guid isPermaLink="false">https://stuff.co.za2021/07/22/artificial-intelligence-ignores-downsides/</guid>

					<description><![CDATA[<p>Many governments are increasingly approaching artificial intelligence with an almost religious zeal. By 2018 at least 22 countries around the world, and also the EU, had launched grand national strategies for making AI part of their business development, while many more had announced ethical frameworks for how it should be allowed to develop. The EU documents more than 290 AI [...]</p>
<p>The post <a href="https://stuff.co.za/2021/07/22/artificial-intelligence-ignores-downsides/">Artificial intelligence: governments see huge business potential, but ignore the downsides</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many governments are increasingly approaching artificial intelligence with an almost religious zeal. By 2018 at least <a href="https://medium.com/politics-ai/an-overview-of-national-ai-strategies-2a70ec6edfd">22 countries</a> around the world, and also <a href="https://digital-strategy.ec.europa.eu/en/policies/european-approach-artificial-intelligence">the EU</a>, had launched grand national strategies for making AI part of their business development, while many more had announced ethical frameworks for how it should be allowed to develop. The EU documents <a href="https://fra.europa.eu/en/project/2018/artificial-intelligence-big-data-and-fundamental-rights/ai-policy-initiatives">more than 290</a> AI policy initiatives in individual EU member states between 2016 and 2020.</p>
<p>The latest is Ireland, which has just announced its national AI strategy, “<a href="https://enterprise.gov.ie/en/Publications/National-AI-Strategy.html">AI – Here for Good</a>”. It aims to become “an international leader in using AI to benefit our economy and society, through a people-centred, ethical approach to its development, adoption and use”.</p>
<p>This is to be obtained via eight policy commandments, including increasing trust in and understanding of AI by using an “AI ambassador” &#8211; a veritable AI high priest – to spread the message around the country. Another aspect is to promote AI adoption by Irish businesses and the government within a special moral and ethical framework. There are several shortcomings in this strategy, which it shares with similar efforts by other countries (leaving aside more obviously bad AI strategies, such as that underlying China’s <a href="https://www.news.com.au/travel/travel-updates/travel-stories/how-china-is-building-nightmarish-surveillance-state-with-cameras-checking-emotions-and-tracking-social-credit/news-story/eaac0d161b959cd539dd7aeedf532b44">surveillance state</a>).</p>
<h2>The hype is tripe</h2>
<p>Such strategies uncritically share the <a href="https://doi.org/10.1080/10438599.2020.1839173">hype and hysteria</a> surrounding AI. A typical example would be the chief executive of Google’s owner Alphabet, Sundar Pichai, <a href="https://www.cnbc.com/2018/02/01/google-ceo-sundar-pichai-ai-is-more-important-than-fire-electricity.html">claiming in 2016</a> that “AI is one of the most important things humanity is working on. It is more profound than, I dunno, electricity or fire”.</p>
<figure class="align-right zoomable">
<div class="enlarge_hint"></div>
</figure>
<p>He would say this, as his company’s business model critically depends on AI, and on people trusting the technology. Ireland’s strategy goes precisely along with such hype by repeating the claim that AI could double Irish economic growth by 2035. It doesn’t detail whose growth, or how.</p>
<p>The strategy lauds various useful existing AI-based apps – which, for instance, improve cycling infrastructure in Dublin, provide Irish language tools, save energy, and comfort dementia suffers – but it is hard to see how more of these could double economic growth.</p>
<p>Most notably, AI is central to a few <a href="https://global.oup.com/academic/product/digital-dominance-9780190845124?cc=nl&amp;lang=en&amp;">digital platform</a> firms such as Google, Apple, Facebook, Amazon and Alibaba &#8211; GAFAA for short. They enjoy <a href="https://www.nber.org/papers/w28285">winner-takes-most</a> benefits due to the fact that current AI requires large amounts of data. As more people use your platform, the profitability of the data <a href="https://www.peterfisk.com/2020/02/metcalfes-law-explains-how-the-value-of-networks-grow-exponentially-there-are-5-types-of-network-effects/#:%7E:text=%E2%80%9CMetcalfe's%20Law%E2%80%9D%20says%20that%20a,of%20nodes%20in%20the%20network.&amp;text=For%20example%2C%20if%20a%20network,10%C3%9710%3D100">grows exponentially</a>.</p>
<p>This has given a huge first-mover advantage to those companies that got it right, turning them into monopolists and gatekeepers. Digital platform firms disrupt existing businesses by <a href="https://www.amazon.com/Platform-Revolution-Networked-Markets-Transforming/dp/0393249131">out-competing</a> them every time &#8211; a good example being how Google, basically an online search-engine, disrupted the advertisement-driven business model <a href="https://www.bloomberg.com/opinion/articles/2019-02-12/google-keeps-eating-the-newspaper-industry">of newspapers</a>, or how Apple is selling <a href="https://www.cnbc.com/2020/02/06/apple-watch-outsold-the-entire-swiss-watch-industry-in-2019.html">more watches</a> than the centuries-old Swiss watch industry.</p>
<p>These platforms also depress the start-up of new firms, for instance by <a href="https://www.titlemax.com/discovery-center/lifestyle/everything-facebook-owns-mergers-and-acquisitions-from-the-past-15-years/">buying up</a> all <a href="https://www.nber.org/system/files/working_papers/w27146/w27146.pdf">potential new competitors</a>. This stifles innovation.</p>
<p>And increasingly, entrepreneurs have to compete on these platforms – for example, Amazon Marketplace. They can be <a href="https://www.theverge.com/2018/12/19/18140799/amazon-marketplace-scams-seller-court-appeal-reinstatement">at the mercy</a> of abuses such as fake product reviews by competitors; rulings on such issues by the gatekeepers that are unpredictable and opaque; and sudden algorithm changes that can affect their business by making them, for example, less visible to potential customers. Then there is the phenomenon of <a href="https://www.sciencedirect.com/science/article/abs/pii/S004016251731452X">digital subsistence entrepreneurs</a> – online sellers who barely earn a living wage.</p>
<p>This radically different (anti-) competition landscape – sometimes labelled “<a href="https://www.economist.com/business/2016/05/21/the-emporium-strikes-back">platform capitalism</a>” – has caused regulators and antitrust authorities <a href="https://www.degruyter.com/document/doi/10.2202/1446-9022.1240/html">substantial headaches</a>. The EU recently adopted proposals for a <a href="https://ec.europa.eu/info/strategy/priorities-2019-2024/europe-fit-digital-age/digital-markets-act-ensuring-fair-and-open-digital-markets_en">Digital Markets Act</a> (DMA) and a <a href="https://ec.europa.eu/info/strategy/priorities-2019-2024/europe-fit-digital-age/digital-services-act-ensuring-safe-and-accountable-online-environment_en">Digital Services Act</a> (DSA), which try to rein in the actual and potential abuses on large AI-based digital platforms.</p>
<p>If AI and automation had been a force to reckon with, we would have seen skyrocketing labour-productivity growth and rising unemployment. Instead, we see stagnating productivity growth – for example, the UK’s is <a href="https://www.bankofengland.co.uk/-/media/boe/files/speech/2018/the-fall-in-productivity-growth-causes-and-implications">the lowest</a> in 200 years &#8211; and some of the <a href="https://www.npr.org/2018/10/05/654417887/u-s-unemployment-rate-drops-to-3-7-percent-lowest-in-nearly-50-years?t=1626273539772">lowest unemployment</a> rates in western economies in decades.</p>
<p>Ireland’s AI strategy ignores the above problems with platform capitalism. The name Google appears only once in the entire document, and Amazon and Facebook not at all. There is no reference to digital platforms, platform capitalism, the DMA, DSA or the EU’s <a href="https://www.cnbc.com/2020/12/18/google-antitrust-cases-in-us-and-europe-overview.html">many antitrust actions</a> against Google. The omission is like Hamlet without the Prince.</p>
<p>Ireland’s AI strategy should have specified how and when AI will achieve the economic benefits it mentions – and who will reap them. It also should have offered a vision of how to make sure that the nation does not suffer from the GAFAAs or become a mere agent of them.</p>
<h2>Firms don’t use it</h2>
<p>The strategy also assumes that a lack of trust in AI is due to people not understanding the technology well enough. So <em>voilà</em>, teaching people data science and having an AI ambassador, like a modern-day prophet, is the answer. One may expect precisely the opposite outcome: the better people understand AI, the less they will trust it.</p>
<p>This would actually be desirable, of course. In the US, where understanding of AI is fairly advanced, adoption rates of AI are in fact meagre. A recent <a href="https://www.nber.org/papers/w28290">US Census Bureau survey</a> of more than 800,000 US firms found that only 2.9% were using machine learning as recently as 2018. A 2020 survey by the <a href="https://op.europa.eu/en/publication-detail/-/publication/f089bbae-f0b0-11ea-991b-01aa75ed71a1">European Commission</a> also pointed to very low adoption levels.</p>
<p>Many <a href="https://www.forbes.com/sites/bernardmarr/2019/03/27/artificial-intelligence-in-automotive-industry-surprisingly-slow-uptake-and-missed-opportunities/#47e4e4d27707">other surveys</a> confirm the low adoption rate of AI. Firms do not adopt it, not because they don’t trust it, but because it makes little business sense. It is too expensive, usually with paltry returns, and comes with <a href="https://arxiv.org/pdf/1906.02243.pdf">an exorbitant</a> environmental price tag – and all that before you factor in the domination of the incumbents.</p>
<p>Ireland’s “AI &#8211; Here for Good”, like many similar national strategies, seems to believe in miracles, for instance that various circles can be squared. These include enabling access to large volumes of relevant data for all firms while protecting everyone’s privacy, and turning the country into a powerhouse for training sizeable deep-learning models and massive data centres while cutting CO₂ emissions. It admits no trade-offs.</p>
<p>The implied message is that Ireland can pluck wonderful fruits from a thicket of thorns, just so long as it trusts in AI and adheres to its particular ethical commandments. <a href="https://www.wsj.com/articles/looking-forward-to-the-end-of-humanity-11592625661">Transhumanists</a>, GAFAA, and other winners-takes-all in the digital economy will approve wholeheartedly.</p>
<ul>
<li><a href="https://theconversation.com/profiles/wim-naude-780658" rel="author"><span class="fn author-name">Wim Naudé </span></a>is Professor of Economics, University College Cork</li>
<li>This article first appeared on <a href="https://theconversation.com/" target="_blank" rel="noopener">The Conversation</a></li>
</ul>
<p><script type="text/javascript" src="https://theconversation.com/javascripts/lib/content_tracker_hook.js" id="theconversation_tracker_hook" data-counter="https://counter.theconversation.com/content/164645/count?distributor=republish-lightbox-advanced" async="async"></script></p>
<p>The post <a href="https://stuff.co.za/2021/07/22/artificial-intelligence-ignores-downsides/">Artificial intelligence: governments see huge business potential, but ignore the downsides</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Improving cybersecurity means understanding how cyberattacks affect both governments and civilians</title>
		<link>https://stuff.co.za/2021/07/20/cybersecurity-affect-government-civilians/</link>
		
		<dc:creator><![CDATA[The Conversation]]></dc:creator>
		<pubDate>Tue, 20 Jul 2021 06:36:31 +0000</pubDate>
				<category><![CDATA[Internet News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Other Tech News]]></category>
		<category><![CDATA[civilians]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[featured]]></category>
		<category><![CDATA[governments]]></category>
		<category><![CDATA[The Conversation]]></category>
		<guid isPermaLink="false">https://stuff.co.za2021/07/20/cybersecurity-affect-government-civilians/</guid>

					<description><![CDATA[<p>For nearly two years, 68 United Nations member states — along with private enterprises, non-governmental organizations, technical communities and academics — participated in an open-ended working group on developments in information and telecommunications in international security (Cyber OEWG). The working group deliberated on responsible state behaviour in cyberspace. In March 2021, the working group produced a final report. [...]</p>
<p>The post <a href="https://stuff.co.za/2021/07/20/cybersecurity-affect-government-civilians/">Improving cybersecurity means understanding how cyberattacks affect both governments and civilians</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For nearly two years, <a href="https://www.un.org/disarmament/open-ended-working-group/">68 United Nations member states</a> — along with private enterprises, non-governmental organizations, technical communities and academics — participated in an open-ended working group on developments in information and telecommunications in international security (Cyber OEWG). The working group deliberated on responsible state behaviour in cyberspace.</p>
<p>In March 2021, the working group produced a <a href="https://front.un-arm.org/wp-content/uploads/2021/03/Final-report-A-AC.290-2021-CRP.2.pdf">final report</a>. The report comes at a critical time in light of the <a href="https://stuff.co.za/2021/06/30/cyberattacks-more-frequent-disruptive/" target="_blank" rel="noopener">high-profile cyberattacks</a> on <a href="https://theconversation.com/the-solarwinds-hack-was-all-but-inevitable-why-national-cyber-defense-is-a-wicked-problem-and-what-can-be-done-about-it-153084">SolarWinds</a> and <a href="https://theconversation.com/security-flaws-in-microsoft-email-software-raise-questions-over-australias-cybersecurity-approach-156864">Microsoft Exchange Server</a>, as well as ransomware attacks on critical civilian infrastructures and <a href="https://www.wsj.com/articles/cyberattacks-cost-hospitals-millions-during-covid-19-11614346713">essential public services</a>.</p>
<h2>Multi-stakeholder inclusion</h2>
<p>The Cyber OEWG was established in 2018. It was tasked to <a href="https://undocs.org/A/RES/73/27">continue cybersecurity negotiations in a more democratic, inclusive and transparent way</a>. The process is <a href="https://dig.watch/processes/un-gge">open to all interested member states</a>.</p>
<p>The Cyber OEWG publicly consults with non-state organizations over concerns about new threats posed by communications technologies. These include online interference in electoral processes, cyberattacks on supply chains and infrastructure and ransom attacks on medical facilities.</p>
<p>Civil society organizations have raised concerns with Cyber OEWG about <a href="https://front.un-arm.org/wp-content/uploads/2020/10/joint-civil-society-groups-feedback-on-oewg-norms-proposals.pdf">the potential humanitarian consequences of malicious activities related to information and communications technologies (ICT)</a>. They demand considering the societal impacts of cyber threats in favour of merely focusing on the economic and political impacts.</p>
<h2>Impacts of malicious cyber activities</h2>
<p>Increasingly, rampant cyberattacks target critical civilian infrastructures, including <a href="https://theconversation.com/australian-hospitals-are-under-constant-cyber-attack-the-consequences-could-be-deadly-150164">health facilities</a>, <a href="https://theconversation.com/colonial-pipeline-forked-over-4-4m-to-end-cyberattack-but-is-paying-a-ransom-ever-the-ethical-thing-to-do-161383">pipelines</a>, <a href="https://edition.cnn.com/2021/02/13/us/florida-hack-remote-access/index.html">water plants</a> and <a href="https://theconversation.com/the-increase-in-ransomware-attacks-during-the-covid-19-pandemic-may-lead-to-a-new-internet-162490">food supply chains</a>. Attacks on <a href="https://www.cbc.ca/news/world/cyberattack-ransomware-kaseya-1.6089578">technology firms</a> have also become commonplace.</p>
<p>These cyber incidents have impacted <a href="https://www.businessinsider.com/microsoft-exchange-hack-us-organizations-krebs-thousands-2021-3">organizations of all sizes</a>, including those with less awareness and capacity to defend themselves, such as <a href="https://www.accessnow.org/who-is-shutting-down-the-internet-in-2021/">civil society organizations</a> and <a href="https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf">small businesses</a>. Civilians may also be affected through ensuing <a href="https://www.bloomberg.com/news/articles/2021-03-07/hackers-breach-thousands-of-microsoft-customers-around-the-world">personal data breaches</a> and <a href="https://www.washingtonpost.com/technology/2021/07/08/ransomware-human-impact/">disrupted public services</a>.</p>
<p>Harm to individuals resulting from a data breach can be <a href="https://www.theguardian.com/world/2015/aug/24/toronto-suicides-ashley-madison-hack">physical</a>, <a href="https://www.cnbc.com/2018/12/06/this-map-shows-where-in-the-us-cyber-crime-costs-people-the-most.html">financial</a>, <a href="https://www.bbc.com/news/technology-54692120">emotional</a> or reputational. Disrupted public services have also resulted in death by <a href="https://www.wired.co.uk/article/ransomware-hospital-death-germany">delaying treatment</a>.</p>
<p><iframe  id="_ytid_12498"  width="749" height="421"  data-origwidth="749" data-origheight="421" src="https://www.youtube.com/embed/nhzAlPotXB8?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;cc_lang_pref=&#038;iv_load_policy=1&#038;loop=0&#038;rel=1&#038;fs=1&#038;playsinline=0&#038;autohide=2&#038;theme=dark&#038;color=red&#038;controls=1&#038;disablekb=0&#038;" class="__youtube_prefs__  epyt-is-override  no-lazyload" title="YouTube player"  allow="fullscreen; accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen data-no-lazy="1" data-skipgform_ajax_framebjll=""></iframe></p>
<figure><figcaption><em><span class="caption">In Dec. 2019, millions of Canadians had their personal information breached after an attack on LifeLabs.</span></em></figcaption></figure>
<h2>Centering civilian security</h2>
<p>People experience cyber threats, incidents and harms <a href="https://citizenlab.ca/2020/08/threats-facing-women-activists-in-colombia-and-costa-rica/">differently</a> depending on their gender identity, ethnicity, race and other social and cultural hierarchies. Those who are in vulnerable and marginalized positions may be <a href="https://www.accessnow.org/who-is-shutting-down-the-internet-in-2021/">disproportionately harmed</a> by cyberattacks.</p>
<p>Organizations such as <a href="https://unidir.org/publication/gender-approaches-cybersecurity">the UN Institute for Disarmament Research</a> and <a href="https://www.apc.org/en/pubs/why-gender-matters-international-cyber-security">the Association for Progressive Communications</a> examine these uneven aspects of cybersecurity. Addressing these inequalities in cybersecurity requires human-centric and inclusive approaches to cybersecurity.</p>
<p>A <a href="https://doi.org/10.1017/S0892679418000618">human-centric approach</a> to cyber-security prioritizes people when assessing cybersecurity threats, incidents, technologies and practices. It recognizes that people’s intersecting identities shape their cybersecurity needs and experience of cyber incidents. Consequently, cybersecurity measures and instruments should be designed to address structural inequalities which lead to insecurity.</p>
<p>Disaggregated data by socio-economic factors on people’s participation in cybersecurity fields and on victims of cyber incidents need to be collected. Efforts to increase underrepresented and minority groups’ participation in cybersecurity workforce should go beyond providing access to education and skills development. Further, cybersecurity skills-building should be tailored to the specific needs and capabilities of targeted population groups, including people with disabilities, the elderly and children.</p>
<p><iframe  id="_ytid_79650"  width="749" height="421"  data-origwidth="749" data-origheight="421" src="https://www.youtube.com/embed/A3DDrrbMGBQ?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;cc_lang_pref=&#038;iv_load_policy=1&#038;loop=0&#038;rel=1&#038;fs=1&#038;playsinline=0&#038;autohide=2&#038;theme=dark&#038;color=red&#038;controls=1&#038;disablekb=0&#038;" class="__youtube_prefs__  epyt-is-override  no-lazyload" title="YouTube player"  allow="fullscreen; accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen data-no-lazy="1" data-skipgform_ajax_framebjll=""></iframe></p>
<figure><figcaption><span class="caption">The UN warns that civilians must also remain vigilant in dealing with cybersecurity.</span></figcaption></figure>
<h2>Building a cyber-resilient society</h2>
<p>The exploitation of vulnerabilities in ICT systems and their weakening of encryption standards can undermine trust and confidence in cyberspace overall. When any one sector or state is more secure, we all reap the benefits. On the other hand, enabling <a href="https://theconversation.com/insecure-by-design-lessons-from-the-meltdown-and-spectre-debacle-90629">insecurity by design</a> and <a href="https://www.washingtonpost.com/national-security/russia-us-un-cyber-norms/2021/06/12/9b608cd4-866b-11eb-bfdf-4d36dab83a6d_story.html">malicious ICT acts</a> degrade the entire security of the cyber ecosystem.</p>
<p>Threats to cybersecurity can emanate from any sector within society, due to human error, natural disaster, technical issues or cyberattacks. The effect can cascade across sectors and levels in unanticipated ways — as demonstrated in the cyberattacks targeted at <a href="https://theconversation.com/security-flaws-in-microsoft-email-software-raise-questions-over-australias-cybersecurity-approach-156864">giant tech firms</a>.</p>
<p>To address the origins and systemic effect of cybersecurity threats, we need to build societal cyber resilience. This would require equal distribution of the resources needed to build cyber capacity and the broad, participation of all affected stakeholders — governmental, private sector and civil society — to shape cybersecurity research, policy and practice.</p>
<p>While <a href="https://www.cfr.org/blog/eliminating-blind-spot-effect-cyber-conflict-civil-society">facing the same persistent cyber threats</a> experienced by states and private entities, civil society organizations are equipped with far fewer resources to defend themselves. Addressing such cross-sectoral cybersecurity resource inequalities could be done through establishing cyber-incident response teams that cater to the need of all affected stakeholders, not just firms operating critical infrastructures.</p>
<p>Cybersecurity funding for <a href="https://cltc.berkeley.edu/wp-content/uploads/2018/07/CLTC_Defending_Politically_Vulnerable_Organizations_Online.pdf">financially constrained</a> sectors, such as civil society organizations and small businesses, is also needed. It is crucial to provide cyber skills building programs for employees in these organizations, including awareness of cyber threats, the importance of cyber hygiene habits and how to respond to cyber incidents.</p>
<p>Good practices at the national level include <a href="https://collections.unu.edu/view/UNU:7760">formalizing civil society organizations’ participation</a> in shaping cybersecurity-related legislation and policies. This would include developing measures to deter cyberattacks, designing cyber capacity building programs and sharing information about cyber threats.</p>
<p>States have started to embrace this inclusive approach to cybersecurity. Several Asia-Pacific countries, including Australia, the Philippines and Sri Lanka, <a href="https://collections.unu.edu/view/UNU:7760">have established national cyber incident response teams that accept reporting from civilians</a>.</p>
<p>Recently, Canada, Australia, New Zealand, the United Kingdom and the United States — <a href="https://www.publicsafety.gc.ca/cnt/ntnl-scrt/fv-cntry-mnstrl-en.aspx">an intelligence alliance knows as the Five Eyes</a> — <a href="https://www.beehive.govt.nz/sites/default/files/2021-04/Five%20Country%20Ministerial%20Statement%20Regarding%20the%20Threat%20of%20Ransomware.pdf">committed to develop a collective response against the threat of ransomware</a>.</p>
<p>The UN is making incremental progress towards multi-stakeholder inclusion and prioritizing civilian security in cybersecurity negotiations. However, much work still needs to be done to follow up on the Cyber OEWG’s proposed actions. Future cybersecurity discussions must establish an accountability mechanism for states’ cyber operations and resolve how international law applies to cyberspace.</p>
<ul>
<li><a href="https://theconversation.com/profiles/debora-irene-christine-771061" rel="author"><span class="fn author-name">Debora Irene Christine </span></a>is Researcher, United Nations University Insitute in Macau, United Nations University</li>
<li>This article first appeared on <a href="https://theconversation.com/" target="_blank" rel="noopener">The Conversation</a></li>
</ul>
<p><script type="text/javascript" src="https://theconversation.com/javascripts/lib/content_tracker_hook.js" id="theconversation_tracker_hook" data-counter="https://counter.theconversation.com/content/163261/count?distributor=republish-lightbox-advanced" async="async"></script></p>
<p>The post <a href="https://stuff.co.za/2021/07/20/cybersecurity-affect-government-civilians/">Improving cybersecurity means understanding how cyberattacks affect both governments and civilians</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>As the use of facial recognition tech increases, it begs the question: Who owns our faces?</title>
		<link>https://stuff.co.za/2021/01/21/facial-recognition-who-owns-our-faces/</link>
		
		<dc:creator><![CDATA[The Conversation]]></dc:creator>
		<pubDate>Thu, 21 Jan 2021 07:39:26 +0000</pubDate>
				<category><![CDATA[Internet News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Other Tech News]]></category>
		<category><![CDATA[Technology News]]></category>
		<category><![CDATA[Big Tech]]></category>
		<category><![CDATA[facial recognition]]></category>
		<category><![CDATA[featured]]></category>
		<category><![CDATA[governments]]></category>
		<category><![CDATA[social media]]></category>
		<category><![CDATA[The Conversation]]></category>
		<guid isPermaLink="false">https://stuff.co.za2021/01/21/facial-recognition-who-owns-our-faces/</guid>

					<description><![CDATA[<p>Who owns your face? Of course, a silly question … right? But what about the data generated from your face? And what does it mean to have your face become data? Facial recognition is a technology you should be aware of. Already, plenty of data about millions and millions of faces exist. We have volunteered our faces [...]</p>
<p>The post <a href="https://stuff.co.za/2021/01/21/facial-recognition-who-owns-our-faces/">As the use of facial recognition tech increases, it begs the question: Who owns our faces?</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Who owns your face? Of course, a silly question … right? But what about the data generated from your face? And what does it mean to have your face become data? Facial recognition is a technology you should be aware of.</p>
<p>Already, plenty of data about <a href="https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html">millions and millions of faces</a> exist. We have volunteered our faces in social media posts and photos stored in the cloud. But we’ve yet to determine who owns the data associated with the contours of our faces.</p>
<p>In the age of Big Tech, we need to grapple with what expectations we can and should have about who has access to our faces. The recent riot at the U.S. Capitol <a href="https://www.wired.com/story/opinion-the-capitol-attack-doesnt-justify-expanding-surveillance/">has put the question into the spotlight</a> as facial recognition becomes a <a href="https://gizmodo.com/police-use-of-clearview-ais-facial-recognition-tech-spi-1846030687">vital tool</a> in identifying rioters: What is the power of facial recognition technology, and are we ready for it?</p>
<p>Even before the riots, facial recognition technology was being used in many ways that we probably haven’t seriously considered, and many of us have voluntarily contributed to creating data about our faces, either explicitly or implicitly. <a href="https://doi.org/10.1038/d41586-020-03188-2">Facial recognition technology, for example, is ubiquitous in public spaces</a>.</p>
<p>As we make decisions on whether to use facial recognition technology for law enforcement, surveillance and other initiatives with ostensible social purposes, we need to stop and ask ourselves: What are the costs of losing our faces to data? There are serious consequences, including the <a href="https://www.un.org/en/universal-declaration-human-rights/">right to privacy</a> and our ability to live our lives free of surveillance.</p>
<p>In Belgrade, according to reports and a video by local non-governmental organization the SHARE Foundation made in support of their initiative <a href="https://hiljade.kamera.rs/en/home/">#hiljadekamera (Thousands of Cameras)</a>, high-definition cameras will be deployed in the Serbian city for a variety of surveillance functions.</p>
<p><iframe  id="_ytid_35403"  width="749" height="421"  data-origwidth="749" data-origheight="421" src="https://www.youtube.com/embed/XlMldmOhYG8?enablejsapi=1&#038;autoplay=0&#038;cc_load_policy=0&#038;cc_lang_pref=&#038;iv_load_policy=1&#038;loop=0&#038;rel=1&#038;fs=1&#038;playsinline=0&#038;autohide=2&#038;theme=dark&#038;color=red&#038;controls=1&#038;disablekb=0&#038;" class="__youtube_prefs__  epyt-is-override  no-lazyload" title="YouTube player"  allow="fullscreen; accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen data-no-lazy="1" data-skipgform_ajax_framebjll=""></iframe></p>
<figure><figcaption><em><span class="caption">There are myriad privacy and surveillance concerns about facial recognition technology. The Share Foundation.</span></em></figcaption></figure>
<p>The director of SHARE, Danilo Krivokapić, says facial recognition technology in those cameras will track individuals’ movements as they wander around the city. Photos that already exist in the system are matched up with the data captured by the cameras, and are then analyzed through a supplied artificial intelligence system. This creates the possibility for tracking a person’s movements, via facial recognition technology, in real time as they move through Belgrade.</p>
<p>But this isn’t just happening in Belgrade. Governments and surveillance go hand in hand, and facial recognition technology gives governments more options and ways to track and constrain the movement of people within their borders.</p>
<p>The <a href="https://www.nytimes.com/2020/01/24/business/london-police-facial-recognition.html">city of London</a> decided last year to deploy cameras capable of facial recognition alongside its <a href="https://www.usnews.com/news/cities/articles/2020-08-14/the-top-10-most-surveilled-cities-in-the-world">627,727 CCTV cameras</a>. The move lead to protests.</p>
<h2>Corporations also employ FRT</h2>
<p>It’s not just governments that want your face.</p>
<p>Last year, <a href="https://www.cadillacfairview.com/">Cadillac Fairview</a>, one of the biggest commercial real estate companies in North America, was called out by the <a href="https://www.priv.gc.ca/en/opc-news/news-and-announcements/2020/nr-c_201029/">Office of the Privacy Commissioner of Canada</a> for installing inconspicuous cameras in directories at 12 of their malls throughout Canada, including Toronto’s iconic Eaton Centre.</p>
<p>These cameras captured five million images of customers and used facial recognition software that generated more data about those images, including gender and age. Although the images were deleted, the data generated from the images was kept on a server by a third party.</p>
<p>In response to the privacy commissioner’s report, <a href="https://www.thestar.com/news/gta/2020/10/29/cadillac-fairview-broke-privacy-laws-by-using-facial-recognition-technology-at-malls-investigators-conclude.html">New Democrat MP Charlie Angus stated</a>:</p>
<blockquote><p>“We have a right to be able to go in public places without being photographed, tracked, put into data surveillance machines, whether it’s for corporations or for police and government.”</p></blockquote>
<p>Unfortunately, Angus is wrong — there is no such right. And since Cadillac Fairview didn’t keep the photos, just the data about the faces in the photos, the problem was about consent, <a href="https://www.cbc.ca/news/canada/calgary/calgary-malls-1.4760964">not violating privacy rights</a>.</p>
<p>What rights do we have when we volunteer our faces to datafication? Journalist Rebecca Heilweil documents <a href="https://www.vox.com/recode/2020/7/3/21307873/facial-recognition-ban-law-enforcement-apple-google-facebook">the many ways we bring facial recognition technology into our lives</a>. Many of us are familiar with Facebook’s photo-tagging technology that tags not just your face, but other people in your photos. This technology is also present in Google and Apple’s photo apps.</p>
<p>But this kind of facial recognition technology is being extended into other realms. For example, <a href="https://www.subaru.ca/WebPage.aspx?WebSiteID=282&amp;WebPageID=22756">Subaru deploys facial recognition technology to detect distracted driving</a>. Apple offers <a href="https://www.macworld.com/article/3563913/homekit-in-ios-14-support-for-facial-recognition-and-adaptive-lighting.html">HomeKit</a> features that cross-reference data collected from various devices, and uses facial recognition to tell you if a friend recognized from your photos is at the door.</p>
<p><a href="https://www.cnet.com/news/google-nest-hub-max-a-new-face-tracking-camera-for-your-home-weve-got-questions/">Nest Hub Max from Google</a> employs facial recognition technology to literally look for you, in the way that it’s always listening for the words: “OK, Google.” <a href="https://www.vox.com/recode/2019/12/12/20993665/artificial-intelligence-ai-job-screen">Hirevue</a> uses AI to evaluate potential employee images for suitability and likelihood for success.</p>
<h2>Fundamental part of who we are</h2>
<p>The human face is <a href="https://theconversation.com/face-time-heres-how-infants-learn-from-facial-expressions-53327">one of the most basic things</a> that <a href="https://news.stanford.edu/news/2012/december/infants-process-faces-121112.html">very young</a> <a href="https://www.sciencedaily.com/releases/2020/03/200302200736.htm">children recognize</a> and learn as their brains sort out the world.</p>
<p>It is a fundamental part of who we are as a species, and its importance is almost too vital to even articulate. Is the data associated with that face — that is, the digital representation of your face that matches up to your actual face or photos of your face — part of that fundamental part of you that you get to keep to yourself? Or is that a foolish expectation in our data-intensive world?</p>
<p>Which brings us back to the U.S. Capitol insurrection. There is a <a href="https://www.newyorker.com/news/news-desk/an-air-force-combat-veteran-breached-the-senate">certainly a sense of justice</a> to <a href="https://www.thestar.com/news/world/2021/01/10/how-a-toronto-researcher-is-helping-to-identify-those-who-attacked-us-capitol.html">see facial recognition technology deployed</a> to bring white supremacists to justice. But at <a href="https://slate.com/technology/2021/01/facial-recognition-technology-capitol-siege.html">what cost</a>?</p>
<p>We know about the <a href="http://gendershades.org/overview.html">biases in our existing data</a> against <a href="https://nyupress.org/9781479837243/algorithms-of-oppression/">people of colour</a>, <a href="https://weaponsofmathdestructionbook.com/">women</a> and of <a href="https://us.macmillan.com/books/9781250074317">low-income status</a>. We know police who use these biased data in the name of <a href="https://www.thestar.com/news/atkinsonseries/2021/01/12/from-facial-recognition-to-predictive-technologies-big-data-policing-is-rife-with-technical-ethical-and-political-landmines.html">algorithmic policing</a> has resulted in <a href="https://www.technologyreview.com/2020/12/10/1013617/racism-data-science-artificial-intelligence-ai-opinion/">harassment</a> of targeted communities and <a href="https://www.nytimes.com/2020/12/29/technology/facial-recognition-misidentify-jail.html">the wrongful arrests of Black people</a>.</p>
<p>The stakes are high, not just for law enforcement, but for our rights to privacy as individuals. Our expectations of data collection and privacy are not in line with the realities of data collection and storage, facial or otherwise. So it’s important to consider our rights in the context of our humanity.</p>
<p><a href="https://www.publicaffairsbooks.com/titles/shoshana-zuboff/the-age-of-surveillance-capitalism/9781610395694/">Our personal data</a> has been and is being collected at an <a href="https://www.domo.com/learn/data-never-sleeps-5">astounding rate every day</a>. That’s resulting in a fundamental change not just in economic and ethical terms, but in the way we live as human beings. Our understanding of human rights, and <a href="https://srinstitute.utoronto.ca/news/austin-lie-deidentified-personal-information-c11">the corresponding laws</a> to protect them, need to be rebooted to account for how <a href="https://srinstitute.utoronto.ca/news/ontario-private-sector-privacy-recommendations">data collection is fundamentally changing</a>.</p>
<ul>
<li><a href="https://theconversation.com/profiles/wendy-h-wong-1028428" rel="author"><span class="fn author-name">Wendy H. Wong</span></a> is Professor of Political Science, University of Toronto</li>
<li>This article first appeared on <a href="https://theconversation.com/" target="_blank" rel="noopener noreferrer">The Conversation</a></li>
</ul>
<p><script type="text/javascript" src="https://theconversation.com/javascripts/lib/content_tracker_hook.js" id="theconversation_tracker_hook" data-counter="https://counter.theconversation.com/content/153253/count?distributor=republish-lightbox-advanced" async="async"></script></p>
<p>&nbsp;</p>
<p>The post <a href="https://stuff.co.za/2021/01/21/facial-recognition-who-owns-our-faces/">As the use of facial recognition tech increases, it begs the question: Who owns our faces?</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Vigilantes and private security are policing the internet where governments have failed</title>
		<link>https://stuff.co.za/2020/02/21/vigilantes-and-private-security-are-policing-the-internet-where-governments-have-failed/</link>
		
		<dc:creator><![CDATA[The Conversation]]></dc:creator>
		<pubDate>Fri, 21 Feb 2020 07:11:48 +0000</pubDate>
				<category><![CDATA[Internet News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Other Tech News]]></category>
		<category><![CDATA[Batman]]></category>
		<category><![CDATA[featured]]></category>
		<category><![CDATA[governments]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[The Conversation]]></category>
		<category><![CDATA[vigilante]]></category>
		<guid isPermaLink="false">https://stuff.co.za2020/02/21/vigilantes-and-private-security-are-policing-the-internet-where-governments-have-failed/</guid>

					<description><![CDATA[<p>Technological changes have fuelled a substantial new private policing sector that includes commercial companies but also online vigilantes. This change is comparable to the “quiet revolution” seen in the 1970s when conventional private policing, particularly the use of uniformed security officers, emerged on an industrial scale.</p>
<p>The post <a href="https://stuff.co.za/2020/02/21/vigilantes-and-private-security-are-policing-the-internet-where-governments-have-failed/">Vigilantes and private security are policing the internet where governments have failed</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The internet revolution of the past 20 years has opened up countless new ways for people to shop, bank, find love – and to commit crimes. Every time we switch on a computer, open an email, view a website or make an online payment, there are multiple new opportunities for crimes to occur. In fact, <a href="https://www.ons.gov.uk/peoplepopulationandcommunity/crimeandjustice/datasets/crimeinenglandandwalesappendixtables">almost half</a> of all crimes against individuals in England and Wales now involve or are enabled by the internet.</p>
<p>These technological changes have fuelled a substantial <a href="https://journals.sagepub.com/doi/abs/10.1177/1043986219890194?journalCode=ccja">new private policing sector</a> that includes commercial companies but also online vigilantes. This change is comparable to the “<a href="https://heinonline.org/HOL/Page?handle=hein.journals/clwqrty22&amp;div=26&amp;g_sent=1&amp;casa_token=&amp;collection=journals">quiet revolution</a>” seen in the 1970s when conventional private policing, particularly the use of uniformed security officers, emerged on an industrial scale.</p>
<p>Despite its scale, online private policing activity has been largely ignored by researchers and politicians. Yet it is already creating some <a href="https://www.routledge.com/Private-Policing-2nd-Edition/Button/p/book/9780815375098">significant issues</a> that need addressing.</p>
<p>This new online private policing sector exists most obviously in the numerous companies providing services. These include designing, testing and maintaining security systems, responding to cyber-attacks and moderating websites for harmful or illegal content.</p>
<p>But many other organisations have also developed their own cybersecurity structures to better protect themselves from online crime. In most large organisations, these structures are led by what are generally called chief information security officers (CISO) but there are also many other new cybersecurity roles such as security architects and ethical hackers.</p>
<figure class="align-center "><img fetchpriority="high" decoding="async" class="alignnone wp-image-44014 size-full" src="http://stuff.co.za/wp-content/uploads/2021/09/file-20200219-10980-1dy0q8v.jpg" alt="" width="754" height="424" /><figcaption><em><span class="caption">Millions of people now work in cyber security.</span> <span class="attribution"><a class="source" href="https://www.shutterstock.com/image-photo/close-technical-engineer-working-on-his-669226081">Gorodenkoff/Shutterstock</a></span></em></figcaption></figure>
<p>Globally, this new sector is estimated to support around <a href="https://www.silensec.com/downloads-menu/whitepapers/item/download/10_d3d9446802a44259755d38e6d163e820">6 million jobs</a> and is predicted to be worth <a href="https://www.marketsandmarkets.com/PressReleases/cyber-security.asp">US$248 billion</a> (£190 billion) by 2023. This is much more than the traditional private security industry, which is only predicted to be worth around <a href="https://www.grandviewresearch.com/industry-analysis/security-market">US$167 billion</a> (£128 billion) by 2025.</p>
<p>One of the most interesting roles to emerge in this new sector is that of the moderators who police the content published on the internet. They play an important role in preventing the <a href="https://www.theverge.com/2019/2/25/18229714/cognizant-facebook-content-moderator-interviews-trauma-working-conditions-arizona">publication of undesirable material</a>, from hardcore pornography and footage from war zones through to abusive and inappropriate language.</p>
<p>There has been virtually no academic research of these important operatives. But <a href="https://www.theguardian.com/technology/2019/sep/17/revealed-catastrophic-effects-working-facebook-moderator">media reports</a> have <a href="https://theconversation.com/we-need-to-talk-about-the-mental-health-of-content-moderators-103830">raised concerns</a> over the welfare of these staff, who often have to view large amounts of distressing content, including images. So their conditions of employment and capabilities should be more of a priority for researchers and regulators.</p>
<h2>Online vigilantes</h2>
<p>The internet hasn’t just stimulated new forms of commercial private policing but has also enabled a new type of vigilantism to flourish. For example, the limited law enforcement response to the masses of scam emails and bogus websites we’re at risk from everyday has led to the growth of “scambaitors”. These are private individuals who try to engage with scammers and <a href="http://www.419eater.com/">waste their time</a> or simply <a href="https://petscams.com/">raise awareness</a> of their scams.</p>
<p>One of the problems with scambaiting is the <a href="https://read.dukeupress.edu/radical-history-review/article-abstract/2013/117/70/88461/419-Digilantes-and-the-Frontier-of-Radical-Justice?redirectedFrom=fulltext">humiliation and racism</a> often involved. For example some scammers have been encouraged to do repetitive tasks such as draw street maps and rewrite books, paint themselves or pose naked in humiliating positions, all of which have then been publicised. Sometimes this is done with explicit or implicit racist commentaries, relating to the fact that many of the scammers are <a href="https://www.wired.com/story/nigerian-email-scammers-more-effective-than-ever/">black West Africans</a>.</p>
<p>Perhaps the most controversial area of online vigilantism that has emerged is <a href="https://theconversation.com/how-online-vigilantes-make-paedophile-policing-more-difficult-42562">paedophile hunting</a>. Organised groups of internet users pose as children in online chatrooms to lure and expose paedophiles.</p>
<p>The actions of these groups have clearly helped the police and led to the exposure of real paedophiles who have subsequently been charged and convicted. In 2018, <a href="https://www.bbc.co.uk/news/uk-england-43634585">at least 150 people</a> in England and Wales were charged using evidence provided by paedophile hunters.</p>
<p>But some groups have made their exposures and confrontations public, in some cases even live-streaming them online. <a href="https://theconversation.com/paedophile-hunters-how-citizen-led-policing-is-putting-peoples-lives-at-risk-110006">This has led</a> to innocent people being falsely and publicly condemned, while others have killed themselves after the exposure. It has also been revealed that some of the people enacting this “justice” are <a href="https://www.coventrytelegraph.net/news/coventry-news/online-crime-fighter-stinson-hunter-6800023">themselves convicted criminals</a> – whereas police forces themselves often bar people with criminal records from joining.</p>
<p>The rapid growth of both commercial and amateur attempts at policing the internet shows there is a demand that is not being met by the traditional provider of law enforcement, the state. But the problems that are emerging from this private security activity demonstrate why it isn’t enough to leave such significant operations to the market or volunteers.</p>
<p>The first “quiet revolution” eventually resulted in many jurisdictions introducing regulations to better control the activities of private security. This new shift at least warrants further research and investigation to determine if the controls are adequate. The suspicion is that they are not.</p>
<ul>
<li><a href="https://theconversation.com/profiles/mark-button-319729" rel="author"><span class="fn author-name">Mark Button </span></a>is Professor of Security and Fraud, University of Portsmouth</li>
<li>This article first appeared on <a href="https://theconversation.com/" target="_blank" rel="noopener noreferrer">The Conversation</a></li>
</ul>
<p><script type="text/javascript" src="https://theconversation.com/javascripts/lib/content_tracker_hook.js" id="theconversation_tracker_hook" data-counter="https://counter.theconversation.com/content/132040/count?distributor=republish-lightbox-advanced" async="async"></script></p>
<p>The post <a href="https://stuff.co.za/2020/02/21/vigilantes-and-private-security-are-policing-the-internet-where-governments-have-failed/">Vigilantes and private security are policing the internet where governments have failed</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>21st-century lobbying: how big data lets big businesses get the upper hand</title>
		<link>https://stuff.co.za/2019/10/22/21st-century-lobbying-how-big-data-lets-big-businesses-get-the-upper-hand/</link>
		
		<dc:creator><![CDATA[The Conversation]]></dc:creator>
		<pubDate>Tue, 22 Oct 2019 22:00:00 +0000</pubDate>
				<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Internet News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Technology News]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[governments]]></category>
		<category><![CDATA[lobbying]]></category>
		<category><![CDATA[Money]]></category>
		<category><![CDATA[The Conversation]]></category>
		<guid isPermaLink="false">https://stuff.co.za2019/10/22/21st-century-lobbying-how-big-data-lets-big-businesses-get-the-upper-hand/</guid>

					<description><![CDATA[<p>Big data hasn’t levelled the playing field. It has simply allowed wealthy organisations and individuals to further entrench their dominance. And regulators can’t keep up. New technologies make it almost impossible to trace the global flow of money World4Brexit may receive to fund its political campaigning</p>
<p>The post <a href="https://stuff.co.za/2019/10/22/21st-century-lobbying-how-big-data-lets-big-businesses-get-the-upper-hand/">21st-century lobbying: how big data lets big businesses get the upper hand</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In July Facebook was <a href="https://www.theguardian.com/technology/2019/jul/24/facebook-to-pay-5bn-fine-as-regulator-files-cambridge-analytica-complaint">fined US$5.1bn</a> by the US Federal Trade Commission (FTC) for not being honest about how it was handling user data. The personal data of 87 million of its users had been harvested by <a href="https://www.theguardian.com/news/2018/may/06/cambridge-analytica-how-turn-clicks-into-votes-christopher-wylie">Cambridge Analytica</a>, a firm which stands accused of building political profiles of individual people in order to influence elections. It is believed that the information was used to influence voters in the US presidential election and the EU referendum of 2016.</p>
<p>The fine is the biggest ever handed down by the FTC. It certainly sounds like a lot, but it isn’t. Facebook’s Q2 earnings, reported the same week, were a <a href="https://www.theguardian.com/technology/2019/jul/24/facebook-revenue-fines-second-quarter">better-than-expected $16.9bn</a>. The fine is the amount of money Facebook makes in 27 days. Facebook investors are relieved. Its share price has risen.</p>
<p>The same week, Brexit Party leader Nigel Farage launched World4Brexit, a US-based fundraising operation aimed at enabling “friends of the UK from around the world” to donate to the ongoing campaign to ensure that the UK leaves the EU. World4Brexit is based in Michigan and is a registered non-profit organisation, which means that it can accept individual donations of up to $5,000 without having to name donors.</p>
<p>The Labour Party has called for an investigation following concerns that the organisation will allow foreign “<a href="https://www.theguardian.com/politics/2019/jul/31/labour-acts-on-risk-of-dark-money-from-farage-led-lobbyists">dark money</a>” to subvert the democratic process. Similar concerns have been raised about the Brexit Party possibly receiving donations through <a href="https://www.theguardian.com/politics/2019/jun/18/brexit-party-check-donations-for-illegal-funding-nigel-farage">Paypal</a> in ways that don’t comply with UK electoral law.</p>
<p>Even if the Labour Party gets its investigation, nothing much will happen. These two events dramatise a tension between money and politics that is unique to the 21st century.</p>
<h2>Bigger business, deeper pockets</h2>
<p>Wealthy individuals and organisations have a disproportionate influence over elected representatives. This has long been the case, and certainly predates the rise of companies such as Facebook, Google and Cambridge Analytica. But the amount of money these companies have to spend is unprecedented. Apple was the first company to be valued at more than $1 trillion. Alphabet (Google’s parent company) is worth around $900bn; Facebook $560bn. The world’s ten richest corporations now own more wealth than the poorest 180 states combined.</p>
<p>As the wealth of these corporations has grown, so the amount they’ve spent on lobbying has grown too. In 2002, for example, Google spent less than $50,000 on lobbying Washington. In 2017, it spent $18m – more than any other company in the world. In 2018, it spent <a href="https://www.theguardian.com/technology/2017/jul/30/google-silicon-valley-corporate-lobbying-washington-dc-politics">$21m</a>. Google also spent more money than any other corporation in the US on political donations in the <a href="https://www.cnbc.com/2019/07/03/after-years-of-spending-techs-political-machine-turns-to-high-gear.html">2016 presidential election</a></p>
<p>The use of lobbyists by corporations is widespread. Non-corporate organisations haven’t been able to keep up. For every $1 spent on lobbying by labour unions and public interest groups combined in 2015, $34 was spent by large corporations and the <a href="https://www.theatlantic.com/business/archive/2015/04/how-corporate-lobbyists-conquered-american-democracy/390822/">associations which represent them</a>.</p>
<h2>The new technology of lobbying</h2>
<p>There is nothing especially new in corporations translating their wealth into political power or in the fact that power is concentrated among wealthy organisations and individuals.</p>
<p>What is new is that technologies have emerged which concentrate power in the hands of the wealthy and increase inequality of access – on a scale unimaginable only a few years ago. Wealthy companies can move money around the globe instantly and anonymously, in official currencies or in cryptocurrencies, issued by no state. They can use this invisible money to purchase the services of lobbyists, or to donate to political campaigns, in ways that are almost impossible to trace. And they can access information that can be used to bolster their lobbying efforts in ways not open to poorer individuals and organisations.</p>
<p>Human civilisation now has greater access to information than at any point in its history. In an ideal world, this fact should be liberating and empowering. It should enrich democracy, inform citizens and make for a more reflective and egalitarian politics. But we don’t live in an ideal world.</p>
<p>We live in a world in which information – and the expertise necessary to analyse it – comes at a price that only wealthy organisations can pay. From the outside, lobbying may look the same as it always has, but it isn’t – it’s driven increasingly by an information divide. A divide between those who can afford it and those who can’t.</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">.<a href="https://twitter.com/peggy_grande?ref_src=twsrc%5Etfw">@peggy_grande</a>, Chair of W4B, welcomed <a href="https://twitter.com/Nigel_Farage?ref_src=twsrc%5Etfw">@Nigel_Farage</a> at our launch event yesterday. A special thank you to everyone who joined us to show that <a href="https://twitter.com/hashtag/Brexit?src=hash&amp;ref_src=twsrc%5Etfw">#Brexit</a> is important for the US and the world. <a href="https://twitter.com/hashtag/BetterOffOut?src=hash&amp;ref_src=twsrc%5Etfw">#BetterOffOut</a> <a href="https://t.co/gj3LLjEvuC">pic.twitter.com/gj3LLjEvuC</a></p>
<p>&mdash; World 4 Brexit (@world4brexit) <a href="https://twitter.com/world4brexit/status/1153753603703746572?ref_src=twsrc%5Etfw">July 23, 2019</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>If you want to glimpse this, take a look at the new niche industry which has emerged to help companies leverage complex data in the service of supplying political intelligence and altering the political agenda.</p>
<p>FiscalNote is an example. Based in the US, it uses “artificial intelligence, machine learning, and natural language processing” to scrape the internet for data on politicians, regulations and public policy developments in order to provide paying clients with up-to-the-minute data they can use to target politicians and mobilise grassroots support.</p>
<p>Its <a href="https://fiscalnote.com/resources?type=caseStudies">clients</a> are some of the wealthiest companies on Earth, including Nestlé, the world’s largest food company ($247bn), Nouryon, the Dutch chemical company ($5bn), and the US Corn Growers Association, which represents the interests of the US field corn and Ethanol industry ($50bn). FiscalNote charges between $US10,000 and <a href="https://www.technologyreview.com/s/611817/tim-hwangs-fiscalnote-is-revolutionizing-washington-lobbying-with-big-data/">“several hundred thousand dollars”</a> a year to enable organisations that can afford it to achieve lobbying successes far beyond what smaller, less resourced organisations can achieve.</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">EU elections concluded last week. @FiscalNoteInEU&#39;s team compiled a list that includes the names, parties, and countries for MEPs in Germany, France, and the United Kingdom. View it here: <a href="https://t.co/PTe1ZXO0tc">https://t.co/PTe1ZXO0tc</a> <a href="https://t.co/JTbjoHbn41">pic.twitter.com/JTbjoHbn41</a></p>
<p>&mdash; FiscalNote (@FiscalNote) <a href="https://twitter.com/FiscalNote/status/1135947122807857154?ref_src=twsrc%5Etfw">June 4, 2019</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p>We all know now that new technologies have made it easier than ever to influence elections, and to move money around the world in ways which are harder to trace. What’s less visible is the extent to which they have made it easier for the wealthy to lobby more effectively for their interests.</p>
<p>Big data hasn’t levelled the playing field. It has simply allowed wealthy organisations and individuals to further entrench their dominance. And regulators can’t keep up. New technologies make it almost impossible to trace the global flow of money World4Brexit may receive to fund its political campaigning. The FTC’s stern rebuke of Facebook was nothing of the kind. Institutions are scrambling, and failing, to keep pace with the technological changes shaping our politics.</p>
<ul>
<li><a href="https://theconversation.com/profiles/phil-parvin-764388" rel="author"><span class="fn author-name">Phil Parvin </span></a>is Senior Lecturer in Politics, Loughborough University</li>
<li>This article first appeared on <a href="https://theconversation.com" target="_blank" rel="noopener noreferrer">The Conversation</a></li>
</ul>
<p>The post <a href="https://stuff.co.za/2019/10/22/21st-century-lobbying-how-big-data-lets-big-businesses-get-the-upper-hand/">21st-century lobbying: how big data lets big businesses get the upper hand</a> appeared first on <a href="https://stuff.co.za">Stuff South Africa</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
