The program represents a shift toward moment-by-moment monitoring of immigrant activities during the lifecycle of their interactions with the United States.
With information, counter-insurgent attacks can dismantle insurgent networks. Without it, insurgencies fester and violence increases.
T-Mobile, Sprint, and AT&T are selling access to their customers’ location data, and that data is ending up in the hands of bounty hunters and others not authorized to possess it, letting them track most phones in the country.
We must reject GCHQ’s newest “ghost” proposal for what it is: a mandated encryption backdoor that weakens the security properties of encrypted messaging systems and fundamentally compromises user trust. By EFF’s Nate Cardozo
Landau is trying to be both nice and say the crocodile clip method is not different than what she has consistently opposed. Encryption without ironclad sender/recipient authentication (introducing unauthorized endpoint access, necessarily unlimited by design) creates an even worse vulnerable architecture than the man in the middle method.
A response to Ian Levy and Crispin Robinson’s principles for debate on exceptional access and proposal for conducting such access.
The long read: We knew that being connected had a price – our data. But we didn’t care. Then it turned out that Google’s main clients included the military and intelligence agencies
“It’s not going to be just about , ’how do we get a lot of data?’” deputy undersecretary Lisa Porter told the House subcommittee. “It’s going to be about, how do we develop algorithms that don’t need as much data? How do we develop algorithms that we trust?”
Bottom Line Up Front There is a race between great powers to develop the most cutting edge and sophisticated approach to harnessing the promise of artificial intelligence. The U.S. has already demonstrated the utility of using AI in counter-terrorism operations, as evidenced by the success of Project Maven. America’s competitors are also using AI, … Continue reading “Artificial Intelligence and Implications for International Security”
If the promise of artificial intelligence is to make systems smarter and more efficient, there may be no better candidate than the US criminal justice system. However, careful attention must be paid to the infrastructure at the heart of every artificial intelligence system: the data and its algorithms, the human beings that use it, and accountability.