Always Providing You With Ongoing Information

Posts tagged ‘Legal’

Uber Accused Of Espionage, By Former Employee

The judge in the $1.86 billion legal battle between ride-hailing giant Uber and Alphabet’s self-driving unit Waymo case, released a damning letter based on the account of a former Uber employee. The letter alleges that a special division within Uber was responsible for acts of corporate espionage, the theft of trade secrets, the bribery of foreign officials and various means of unlawful surveillance.

The company solicited undercover agents to collect intelligence against the taxi groups and local political figures. The agents took rides in local taxis, loitered around locations where taxi drivers congregated, and leveraged a local network of contacts with connections to police and regulatory authorities..

The “Jacobs letter” was written by the attorney for Richard Jacobs, who previously worked as Uber’s manager of global intelligence before being fired in April. The highly detailed account brings about accusations of systematic illegal activity inside Uber’s Strategic Services Group (SSG) which allegedly sought to surface other companies’ trade secrets through eavesdropping and data collection. The letter alleges that some of the information gathered was relayed to then-CEO Travis Kalanick.

The trial has been delayed until February 2018 to give the Waymo legal team more time to investigate claims Jacob’s claims.


Curbing Fake Academic Credentials


It  appears that it is very easy to get a fake academic certificate from any major urban centers. The buyer of the fake certificate dont have to worry about the authenticity of the signatures or paper quality – all that is sorted out by the fraudsters.

The discussion is often about whether you want a PhD, master’s or bachelor’s degree. Additionally, the more prestigious the university you want to claim to have graduated from , the more  money you will be required to pay for the fake certificate.

Once you have the fake paper in your hands, you can apply for prominent jobs, particularly in the public sector, where job security is so high that getting fired at a later stage is more complicated and costly.

Employers find it time-consuming to authenticate or verify that glimmering certificate from the purported universities for various reasons.

In developed economies, the data protection laws do not allow universities to disclose the private credentials of students to third parties – unless the students expressly and explicitly ask them to make the disclosure.

MIT and the University of Melbourne are pioneering this approach and solution to this problem. Blockchain technology-providing a decentralised ledger that is globally accessible, immutable, secure and with the support of anonymity. Universities can record student academic certificates into the global blockchain, allowing graduates to access their credentials from anywhere across the globe and share them with potential employers.

Click Here For More


Question-Should Drunk Drivers Be Charged In Autonomous Vehicles?



An independent panel pulled together by the Australian government released a report this week trying to hash out the difficulties that governing bodies will face in rewriting laws for humans engaging self-driving systems. That panel, called the National Transport Commission (NTC), wants to develop a clear set of laws by 2020, and its paper (PDF) solicited feedback from key industry players as the panel moves forward.

Though it may seem obvious that a drunk person should be allowed to be taxied home by a fully autonomous car, the question is less clear if you have to determine just how autonomous an autonomous vehicle needs to be for a drunk person to operate it. The government should want drunk people to engage a high-level autonomous driving system if the alternative is driving themselves home, but if they’ll be penalized for being drunk while they’re “in control” of an autonomous vehicle, uptake of self-driving systems may be slow.

Instead, the NTC argues, drunk driving offenses should only apply to drunk people who are manually operating their vehicles but not to people who have merely started an autonomous car. The present rules “exist because a person who starts or sets in motion a conventional vehicle while under the influence clearly has an intention to drive,” the NTC writes.

The questions are being raised in the US, too. At the Governors’ Highway Safety Association meeting this week, US authorities discussed open container laws in autonomous vehicles. Currently, it’s illegal to have an open alcohol container in a car while you’re driving US roads. But should that apply in fully autonomous systems where no one is driving?

Who makes these rules and enforces them is its own debate in the US, too, with the Trump administration largely calling for a continuation of the Obama administration’s “light regulatory touch” philosophy when it comes to automakers building self-driving cars. In Congress, the House passed a bill last month directing the National Highway Traffic Safety Administration (NHTSA) to adopt some guidelines for self-driving cars analogous to its regulation of manually driven cars.

They Say Not To Worry About Superhuman Babies But Fear Who Will Be Doing The Genetic Engineering

Sir Venki Ramakrishnan says risks and benefits of germline therapy, which is banned in Britain, should be debated

Sir Venki Ramakrishnan
Sir Venki Ramakrishnan, president of the Royal Society. Photograph: Andy Hall for the Observer

An international team of scientists, led by researchers at the Oregon Health and Science University, has used genetic engineering on human sperm and a pre-embryo. The group says is doing basic research to figure out if new forms of genetic engineering might be able to prevent or repair terrible hereditary diseases. Congress has banned federal funding for genetic engineering of sperm, eggs, pre-embryos or embryos. That means everything goes on in the private or philanthropic world here or overseas, without much guidance. It should be determined who should own the techniques for genetic engineering. Important patent fights are underway among the technology’s inventors. Which means lots of money. is at stake. And that means it is time to talk about who gets to own what and charge what. Finally, human genetic engineering needs to be monitored closely: all experiments registered, all data reported on a public database and all outcomes — good and bad — made available to all scientists and anyone else tracking this area of research. Secrecy is the worst enemy that human genetic engineering could possibly have. Today we need to focus on who will own genetic engineering technology, how we can oversee what is being done with it and how safe it needs to be before it is used to try to prevent or fix a disease. Plenty to worry about.

If Your Face Is Scanned the Next Time You Fly……………………HUH?


Scanned Face

There’s unsurety as to what the Government is doing with the images. They say, Facial-recognition systems may indeed speed up the boarding process, however, the real reason they are cropping up in U.S. airports is that the government wants to keep better track of who is leaving the country, by scanning travelers’ faces and verifying those scans against photos it already has on file. The idea is that this will catch fake passports and make sure people aren’t overstaying their visas. The U.S. Department of Homeland Security has partnered with airlines including JetBlue and Delta to introduce such recognition systems at New York’s JFK International Airport, Washington’s Dulles International, and airports in Atlanta, Boston, and Houston, among others. It plans to add more this summer.

“As It Searches for Suspects, the FBI May Be Looking at You”). Privacy advocates also point out that research has shown the technology to be less accurate with older photos and with images of women, African-Americans, and children (see “Is Facial Recognition Accurate? Depends on Your Race”).



Quantum Technology To Eliminate Counterfeit Products & Fake Goods

Image result for fake goodsImage result for fake goods

Researchers have created a unique atomic-scale identifications based on the irregularities found in 2D materials like graphene, making it possible to fingerprint them in simple electronic devices and optical tags. Because of the materials used, the small tags could be edible and coated onto medicines.

The counterfeit industry is a huge market with imports of counterfeited or fake agoods costing nearly $500 billion in lost revenue around the world annually, with counterfeit medicines accounting for nearly $200 billion alone.

The team is also showcasing the new technology through a smartphone app that allows people to check on their own the authenticity of a product by reading whether a product is real or fake.

The customer can scan the optical tag with the app that matches the 2D tag with the manufacturer’s database.

The researchers expect the patented technology and smartphone app to be available publicly in 2018.

When light is shone on graphene, tiny imperfections shine causing the material to emit light that can be measured as a signal, unique only to that small section of material. The signal can be turned into a digital fingerprint with a number sequence.

The study was published in 2D Materials.

On the other hand in another report by the European Union,  says  this

Is Forgetting Your Password A Valid Defense?


Two suspects accused of extorting the so-called “Queen of Snapchat” as part of a sex-tape scandal are scheduled to appear in a Florida court on May 30, 2017. The accused need only to answer a simple question on this visit. Miami-Dade Circuit Judge Charles Johnson wants an explanation as to why the defendants can’t remember the passcodes to their mobile phones. 

If the judge doesn’t believe them or if they remain silent, the two suspects face possible contempt charges and indefinite jail time for refusing a court order to unlock their phones so prosecutors can examine text messages. Their defense to that order, however, rests on an unsettled area of law. Both defendants maintain that a court order requiring them to unlock an encrypted device is a breach of the Fifth Amendment right to be free from compelled self-incrimination.

More Here

Tag Cloud

%d bloggers like this: