Jan 6 2023
I’m gonna do a manual quote here to say that this is exactly the type of stuff we predicted, and especially with automation bias with people overtrusting model outputs. Police didn’t even check the height of the person they claimed did this, and neither was the person in Atlanta.
https://dair-community.social/@timnitGebru/109634485377349541A black man wrongfully jailed for a week in Louisiana after face recognition error, report says. Lawyer says police didn't check man's height, weight or the mole on his face.
https://dair-community.social/@poppastring@dotnet.social/109634255362720798
Facial Recognition Tech Used To Jail Black Man For Louisiana Theft - He's Never Been To Louisiana
A Georgia man spent almost a week in jail after Louisiana police wrongly identified him as a fugitive using facial recognition software.
-
-
-
-
-
A nice paper on Ukraine drones.
https://www.kcl.ac.uk/drones-and-defence-innovation-in-ukraine-consolidating-wartime-ingenuity
-
This article from @lhn@mastodon.online on pig butchering scams is really good, and a great thing to send your friends and family. https://www.wired.com/story/what-is-pig-butchering-scam/
Lesley Carhart :unverified:: "This article from @lhn@mastodon.online on pig but…" - Infosec Exchange
This article from @lhn@mastodon.online on pig butchering scams is really good, and a great thing to send your friends and family. https://www.wired.com/story/what-is-pig-butchering-scam/?utm_source=pocket-newtab
-
@malwaretech Don't forget Kaspersky finding 20 expired C2s belonging to the the NSA and gaining access to a massive hacking campaign that had gone undetected for 14 years.
https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/"Perhaps most costly to the attackers was their failure to renew some of the domains used by these servers. Out of the 300 or so domains used, about 20 were allowed to expire. Kaspersky quickly registered the domains and, over the past ten months, has used them to "sinkhole" the command channels, a process in which researchers monitor incoming connections from Equation Group-infected machines."
Dan Goodin: "@malwaretech Don't forget Kaspersky finding 20 ex…" - Infosec Exchange
@malwaretech Don't forget Kaspersky finding 20 expired C2s belonging to the the NSA and gaining access to a massive hacking campaign that had gone undetected for 14 years. https://arstechnica.com/information-technology/2015/02/how-omnipotent-hackers-tied-to-the-nsa-hid-for-14-years-and-were-found-at-last/ "Perhaps most costly to the attackers was their failure to renew some of the domains used by these servers. Out of the 300 or so domains used, about 20 were allowed to expire. Kaspersky quickly registered the domains and, over the past ten months, has used them to "sinkhole" the command channels, a process in which researchers monitor incoming connections from Equation Group-infected machines."
-
-
// by @S2W_Official