“It’s not going to be just about , ’how do we get a lot of data?’” deputy undersecretary Lisa Porter told the House subcommittee. “It’s going to be about, how do we develop algorithms that don’t need as much data? How do we develop algorithms that we trust?”
Bottom Line Up Front There is a race between great powers to develop the most cutting edge and sophisticated approach to harnessing the promise of artificial intelligence. The U.S. has already demonstrated the utility of using AI in counter-terrorism operations, as evidenced by the success of Project Maven. America’s competitors are also using AI, … Continue reading “Artificial Intelligence and Implications for International Security”
If the promise of artificial intelligence is to make systems smarter and more efficient, there may be no better candidate than the US criminal justice system. However, careful attention must be paid to the infrastructure at the heart of every artificial intelligence system: the data and its algorithms, the human beings that use it, and accountability.
The millions of dots on the map trace highways, side streets and bike trails — each one following the path of an anonymous cellphone user.
One path tracks someone from a home outside Newark to a nearby Planned Parenthood, remaining there for more than an hour. Another represents a person who travels with the mayor of New York during the day and returns to Long Island at night.
An article in the latest issue of the Yale Law Journal tells the story of the outsized role that courts play in managing the global governance of the internet.
Source: Litigating Data Sovereignty
Days before the migrant caravan left Honduras, a fake Facebook account was used to try to bolster its numbers. The social media giant has since deactivated the account but has refused to provide information about who created it.
Rather than continuing to politicize encryption, instead the lessons learned from the decades-long crypto policy debate should be used to inform the process of developing Exceptional Access