The National Vetting Enterprise: Artificial Intelligence and

The program represents a shift toward moment-by-moment monitoring of immigrant activities during the lifecycle of their interactions with the United States.

Source: The National Vetting Enterprise: Artificial Intelligence and

Advertisements

Lessons From the Long War: The Role of Information in Counter-Insurgency

With information, counter-insurgent attacks can dismantle insurgent networks. Without it, insurgencies fester and violence increases.

Source: Lessons From the Long War: The Role of Information in Counter-Insurgency

I Gave a Bounty Hunter $300. Then He Located Our Phone

T-Mobile, Sprint, and AT&T are selling access to their customers’ location data, and that data is ending up in the hands of bounty hunters and others not authorized to possess it, letting them track most phones in the country.

Source: I Gave a Bounty Hunter $300. Then He Located Our Phone

Give Up the Ghost: A Backdoor by Another Name

We must reject GCHQ’s newest “ghost” proposal for what it is: a mandated encryption backdoor that weakens the security properties of encrypted messaging systems and fundamentally compromises user trust. By EFF’s Nate Cardozo

Source: Give Up the Ghost: A Backdoor by Another Name

Exceptional Access: The Devil is in the Details

Landau is trying to be both nice and say the crocodile clip method is not different than what she has consistently opposed. Encryption without ironclad sender/recipient authentication (introducing unauthorized endpoint access, necessarily unlimited by design) creates an even worse vulnerable architecture than the man in the middle method.

A response to Ian Levy and Crispin Robinson’s principles for debate on exceptional access and proposal for conducting such access.

Source: Exceptional Access: The Devil is in the Details

Social Media Content Moderation: The German Regulation Debate

Germany’s Network Enforcement Act (NEA) places strict requirements on “social network providers” to remove illegal content and respond to complaints.

Source: Social Media Content Moderation: The German Regulation Debate

Google’s Earth: how the tech giant is helping the state spy on us

The long read: We knew that being connected had a price – our data. But we didn’t care. Then it turned out that Google’s main clients included the military and intelligence agencies

Source: Google’s Earth: how the tech giant is helping the state spy on us

Show Me The Data: The Pentagon’s Two-Pronged AI Plan

“It’s not going to be just about , ’how do we get a lot of data?’” deputy undersecretary Lisa Porter told the House subcommittee. “It’s going to be about, how do we develop algorithms that don’t need as much data? How do we develop algorithms that we trust?”

Source: Show Me The Data: The Pentagon’s Two-Pronged AI Plan

Artificial Intelligence and Implications for International Security

Bottom Line Up Front There is a race between great powers to develop the most cutting edge and sophisticated approach to harnessing the promise of artificial intelligence. The U.S. has already demonstrated the utility of using AI in counter-terrorism operations, as evidenced by the success of Project Maven. America’s competitors are also using AI, … Continue reading “Artificial Intelligence and Implications for International Security”

Source: Artificial Intelligence and Implications for International Security

Better Data and Smarter Data Policy for a Smarter Criminal Justice System System

If the promise of artificial intelligence is to make systems smarter and more efficient, there may be no better candidate than the US criminal justice system. However, careful attention must be paid to the infrastructure at the heart of every artificial intelligence system: the data and its algorithms, the human beings that use it, and accountability.

Source: Better Data and Smarter Data Policy for a Smarter Criminal Justice System System