Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Big Tech. Show all posts

India's DPDP Act: Industry's Compliance Challenges and Concerns

As India's Data Protection and Privacy Act (DPDP) transitions from proposal to legal mandate, the business community is grappling with the intricacies of compliance and its far-reaching implications. While the government maintains that companies have had a reasonable timeframe to align with the new regulations, industry insiders are voicing their apprehensions and advocating for extensions in implementation.

A new LiveMint report claims that the government claims businesses have been given a fair amount of time to adjust to the DPDP regulations. The actual situation, though, seems more nuanced. Industry insiders,emphasize the difficulties firms encounter in comprehending and complying with the complex mandate of the DPDP Act.

The Big Tech Alliance, as reported in Inc42, has proposed a 12 to 18-month extension for compliance, underscoring the intricacies involved in integrating DPDP guidelines into existing operations. The alliance contends that the complexity of data handling and the need for sophisticated infrastructure demand a more extended transition period.

An EY study, reveals that a majority of organizations express deep concerns about the impact of the data law. This highlights the need for clarity in the interpretation and application of DPDP regulations. 

In another development, the IT Minister announced that draft rules under the privacy law are nearly ready. This impending release signifies a pivotal moment in the DPDP journey, as it will provide a clearer roadmap for businesses to follow.

As the compliance deadline looms, it is evident that there is a pressing need for collaborative efforts between the government and the industry to ensure a smooth transition. This involves not only extending timelines but also providing comprehensive guidance and support to businesses navigating the intricacies of the DPDP Act.

Despite the government's claim that businesses have enough time to get ready for DPDP compliance, industry opinion suggests otherwise. The complexities of data privacy laws and the worries raised by significant groups highlight the difficulties that companies face. It is imperative that the government and industry work together to resolve these issues and enable a smooth transition to the DPDP compliance period.

Pentagon Weapons Systems Have 'Nearly All' Vulnerabilities

 


It appears as though the United States has penetrated Russian military and intelligence services deeply in the past year, as evidenced by the revelations of secret Pentagon documents that have been leaked online through social media, revealing that Washington also appears to be spying on some of its closest allies, including Ukraine, Israel, and South Korea, by releasing a trove of secret Pentagon documents. 

The Pentagon is attempting to leverage artificial intelligence to outfox, outmaneuver, and dominate future adversaries of the United States. Despite its unsteady nature, AI is a technology that could present opponents with another way to attack if not handled carefully. 

There is a newly established unit within the Joint Artificial Intelligence Center, established by the Pentagon to assist the US military in exploiting artificial intelligence. This unit is charged with collecting, testing, and distributing machine learning algorithms from open source and industry across the Department of Defense for use. Artificial intelligence for military purposes raises some major challenges, which are expressed as part of that effort. A Testing and Evaluation Group, or "tasked with probing pre-trained AI models for weaknesses", is called a "red team" in machine learning. There is also a cybersecurity team that examines AI code and data for potential vulnerabilities hidden in them. 

Pentagon officials should not limit their efforts to protect their data networks or just their industrial and information systems, as their vehicles and weapons are also among the most vulnerable at the Pentagon. 

The military cannot manage even the simplest internal systems. This is one of the main reasons for the military's limited ability to defend these systems. 

There was evidence that Washington was spying on some of its closest allies based on the documents provided. The national security officials in the country were listening in on conversations between senior members of the country's national security council about whether the country would be selling artillery shells that were used in Ukraine. As a result, a political backlash was initiated in Seoul on Monday, where opposition lawmakers denounced the United States' abuse of its sovereignty as a clear violation of the sovereignty of the people. 

The technique behind modern AI, machine learning, is fundamentally different from the traditional methods used to write computer code and is often more powerful. By learning from data, a machine learns its own rules by itself, rather than writing the rules themselves for the machine to follow. The problem with this learning process is that it can produce strange or unpredictable behavior in AI models because of artifacts or errors in the training data, and this can render the model unreliable. 

There have been several explosive reports released by the Government Accountability Office (GAO) this month that concluded the Pentagon's $1.7 trillion procurement pipeline contains "nearly all" weapons systems with major cybersecurity holes. 

It is certain that cyber breaches involving weapons systems during a crisis or, in the case of a military conflict, could result in grave consequences, as they could potentially allow an enemy to misfire or cause military failures as a result of breaches. 

The Pentagon's systems are becoming enticing targets for hackers, the report said, as they have become easier to hack over the past decade. It is not the first time this warning has been issued -- at least a half-dozen military studies have raised alarms since the 1990s. 

It was only in 2014, the GAO noted in its report on cyber vulnerabilities in weapons systems that the Pentagon began to conduct routine checks for these vulnerabilities. It is estimated that as many as 80 percent of systems have never been tested. In a recent report, the Department of Defense [the Department of Defense] said that cybersecurity was not given the top priority in the acquisition of weapon systems until recently. Currently, the Department of Defense is seeking to understand how to apply cybersecurity to weaponry systems. 

It is expected that the Pentagon will develop its offensive capabilities for reverse engineering, poisoning, and subverting its adversaries' AI systems shortly. Currently, the focus of the effort is to make sure that American military AI is unattackable and cannot be compromised. As he puts it, "We have the option to proceed with the aggressive strategy." He says, "Let's just make sure it isn't something we can do against us, but it will be possible." Allen does not want to comment on whether the US is developing offensive capabilities. 

To ensure that their economies can leverage the power of this powerful new technology to the fullest extent, many nations have developed national AI strategies. 

During this period, big tech companies, in particular in the United States and China, are jockeying for positions in the commercialization and exportation of the latest AI techniques. This is to gain an advantage.  

There is a need to protect the algorithms that are important to the military supply chain or contribute to the making of critical decisions that affect the mission.