Wise words on risks of accuracy in profiling, customized crafting of messages, impersonation and loss of confidence in authentication of individual. I am not sure how otherwise relevant scale and speed of AI can be. Limitations on information input, absorption and processing capability of human beings are blessings that cap the output power any information presentation system. The danger is not in death by a thousand cuts of utterly confused and zombie citizens, but one mission bullets which then are not effective for mass deception, and easier to defend against their best logical targets of critical decision makers.
Today, waging information warfare is a manpower-intensive effort. What if that changes?
Source: Could AI-Driven Info Warfare Be Democracy’s Achilles Heel?
Presidents and generals depend upon timely intelligence to shape their decisions in a world of ambiguity, hostile actors and disinformation. The savviest leaders in the private sector do the same. Governments have broad intelligence authorities and powerful tools unavailable to the private sector, but they do not have a monopoly on the application of intelligence.
Source: A CEO’s Brief Guide to Intelligence: “Not Just for Three-Letter Agencies”
The EU data law is scheduled to take effect May 25.
Source: Summary: The EU General Data Protection Regulation
But then so many people on FB are legends in their own minds and curate their profile to scream so.
From the information coherence perspective, the requirement of longer running, more consistent public information with independent public validations (interactions, relationships, location presence, etc.) makes the personas not concurrently replicable, transferable or reusable. (Not taking into account creating fake social media cross referenced identities on the fly which is done for law enforcement and undercover purposes but not for deep cover.)
The required exposure and public undercover networks are also mutual damage multipliers. Once burnt they are operationally finished with cascading affects. Add instant facial recognition, biometrics and a whole network can get nuked before they know. The technology is not future, it is operational now.
In the age of social media, where the complete absence of a detailed social media presence can be a red flag, how do spies conceal their identity?
Source: No Facebook or Twitter? You’re Probably a Spy.
On May and June 2013, when New Orleans’ murder rate was the sixth-highest in the United States, the Orleans Parish district attorney handed down two landmark racketeering indictments against dozens of men accused of membership in two violent Central City drug trafficking gangs, 3NG and the 110ers. Members of both gangs stood accused of committing 25 murders as well as several attempted killings and armed robberies.
Source: Palantir has secretly been using New Orleans to test its predictive policing technology – The Verge
Very nice thought through paper. The challenge is in the details and implementation. Practically impossible to arrive at common baseline standards, implement and monitor/ensure compliance and change.
A new paper from New America introduces a novel framework for data flow controls.
Source: Protecting the Future of Cross-Border Data Flows
Not all identities and breaches are equal or lend themselves to same level of protection.
“The Russian influence campaign had real and substantial effects—and the data of private individuals was critical to conducting the con. Russian operatives purchased stolen U.S. identities, which they used to open U.S. bank and PayPal accounts and to buy access on U.S.-based servers; they then purchased Facebook ads and “buttons, flags, and banners” for political rallies.”
I did not hear of that “critical” part. What must-have access to what U.S.-based servers requiring U.S. bank and PayPal accounts? Ads do not need to be purchased by US residents or citizens but any ad agency, fake news outlet or entity.
The posing as real Americans argument is weak, it was not a skilled stealing of identity but an easy to pull off and hard to stop impersonation. Targeting real people with fake news was the real citizen related problem but that was a Facebook ad revenue feature.
Rather than bundling all breaches under one data breach/privacy umbrella issue, it is more properly addressed as a tool in the context issue: cyber crime, cyber espionage, information warfare, political interference, etc.
Theft of private individuals’ information tends to be viewed as serious only when people suffer direct harm. But such theft can have much larger consequences.
Source: Understanding Data Breaches as National Security Threats
Recent regulatory developments in Europe highlight the complication of applying different regulatory regimes to a single global social media platform.
Source: Facebook’s Policies Pressed From All Sides as Europe Cracks Down
Microsoft Ireland is set to go forward with oral argument, with widely divergent views of who should win and why.
Source: Symposium Recap: We Need the Cloud Act To Save Us & What Bill Dodge Got Right
This guy made an imaginary horse and beat it do death.”Microsoft’s actions can be read as a sub rosa declaration of independence from the rule of law, a declaration that enlists all of us as its unwitting revolutionaries.” and he goes on and on and on.
So MS and other companies are supposed to second-guess, police and enforce user nationality, place of residence (how?) and not make an information-limited and balanced network optimization decision? But they did not because they foresaw this coming and the geek programmers in Redmond had revolution on their mind! It is a f***ing drop-down menu.
Paul should join the resistance! I can not top this one … he was an EE major. He must have had a hard time with the charges at the DOJ.
Microsoft’s design decisions contributed to the problem in Microsoft Ireland, as did its revolution against borders and local laws.
Source: The Microsoft Design Decisions That Caused this Mess