Parcel pilferage is a pernicious and persistent problem :)

    • “Amazon considers AI-powered doorbell cameras to stop package theft
    • Amazon acquired Ring in early 2018 for an undisclosed amount.
    • The Ring devices would be configured to monitor a drop zone where packages are left using artificial intelligence.”

    https://www.google.com/amp/s/www.wfsb.com/amazon-considers-ai-powered-doorbell-cameras-to-stop-package-theft/article_ef431549-9840-5b3a-82c4-2b9e069c815c.amp.html


    Why video doorbells are winning over residents — and police

    • “The market researcher forecasts that more than 3.4 million video doorbells will be sold this year, with the United States accounting for the majority of sales.”
  • https://www.google.com/amp/s/www.chicagotribune.com/business/ct-video-doorbells-crime-prevention-20181128-story,amp.html

  • https://www.statista.com/statistics/828230/world-smart-home-video-doorbell-spending/
  • Where is AI Used the Most? In Cybersecurity

    • “Data suggests that artificial intelligence was put to work in a cybersecurity capacity more than in any other area of service last year. With the use of deep learning algorithms, AI is leading the charge on a secure internet.
    • Specifically in detecting and deterring security intrusions, with 44 percent of all AI applications being used for that purpose.
    • Azure Sentinel, Microsoft’s cloud-based SIEM (security information and event management) tool is one such example of an artificial intelligence that doesn’t just automate security operations tasks but uses algorithms to learn from its actions. Like any AI, the more data it receives, the more accurate its decisions are in identifying threats and responding to them.”

    https://www.google.com/amp/s/www.pcmag.com/news/367929/ais-top-use-in-2018-was-in-cybersecurity-applications%3famp=1

    Debunking The Myths And Reality Of Artificial Intelligence

    “AI solutions are secure by design, really?

    Usually, hackers access traditional software systems to steal data. They hack industrial control systems and misguide them to do the wrong action(s). However, the core of AI systems has mainly algorithms and not much data. This created the illusion of absolute security by nature among some people, as nothing inside to steal. However, instead of stealing data, cyber attackers can feed AI systems with wrong data to manipulate their ability to take the right decisions. For example, attackers could access Electronic Medical Records (EMR) to add or remove medical conditions in MRI scans which will lead to the wrong diagnosis by ML algorithms. Same could happen to financial data or the operational data of critical equipment in a Nuclear Power Plant (NPP) or a smart grid.”

    https://www.google.com/amp/s/www.forbes.com/sites/cognitiveworld/2019/04/22/debunking-the-myths-and-reality-of-artificial-intelligence/amp/

    55% of Americans approve the use of facial recognition for public safety, but the technology raises privacy concerns

    • “In the US, the government is planning to deploy face recognition at 20 airports by 2021.
    • In June 2018, the suspect in the shooting at a local newspaper in Annapolis, Maryland, was identified using facial recognition technology. 55% of Americans indeed approve the use of facial recognition for public safety.
    • Last year, the police of New Delhi has been able to find 3,000 missing children in just four days thanks to a new facial recognition system.
    • In China, the police has been partnering with SenseNets, a company developing a facial recognition software, to bring charges against people involved in illegal gatherings in the province of Guangdong.
    • Last year, Amazon’s facial recognition systems falsely matched 28 members of Congress to criminal mugshots.”

    https://m-bonus.usbeketrica.com/article/facial-recognition-regulatory-framework-science-china

    How Wells Fargo Uses AI, Biometrics To Fight Money Laundering

    “’The fact that [customers are] connected to the internet of things opens the door to the broader spectrum of payment activity. That allows us to do is to build deeper profiles, [which AI can use] to better predict if [a transaction] is something [the customer] would do,’ Monroe said.

    This influx of new data means banks must look beyond authenticating login credentials. Users’ payment histories, how they hold their phones and type in their passwords, as well as other factors should be considered during the authentication process.”

    https://www.google.com/amp/s/www.pymnts.com/news/digital-banking/2019/wells-fargo-aml-biometrics-ai/amp/