Normal view

There are new articles available, click to refresh the page.
Today — 18 May 2024Main stream

OpenAI putting ‘shiny products’ above safety, says departing researcher

Jan Leike, a key safety researcher at firm behind ChatGPT, quit days after launch of latest AI model, GPT-4o

A former senior employee at OpenAI has said the company behind ChatGPT is prioritising “shiny products” over safety, revealing that he quit after a disagreement over key aims reached “breaking point”.

Jan Leike was a key safety researcher at OpenAI as its co-head of superalignment, ensuring that powerful artificial intelligence systems adhere to human values and aims. His intervention comes before a global artificial intelligence summit in Seoul next week, where politicians, experts and tech executives will discuss oversight of the technology.

Continue reading...

💾

© Photograph: Michael Dwyer/AP

💾

© Photograph: Michael Dwyer/AP

Rubbish music, chatbots and online queues: welcome to your life lived on hold | Elle Hunt

By: Elle Hunt
18 May 2024 at 04:00

Last year British taxpayers spent 800 years waiting to speak to HMRC. This is the price of a world digitised on the cheap

In taking stock of how we spend our days, no one likes to think of all the hours we’ve spent on the phone to the tax office. Yet that and other necessary administrative evils are increasingly taking up our precious time.

Taxpayers spent an accumulated total of almost 800 years on hold on the phone with HM Revenue & Customs last year, according to the National Audit Office, the government’s spending watchdog. It’s one of those stats that short-circuits the brain: more than the combined lifetimes of all the people to whom our call is inevitably transferred, should anyone ever actually answer it.

Elle Hunt is a freelance journalist

Continue reading...

💾

© Photograph: Alexander Korzh/Alamy

💾

© Photograph: Alexander Korzh/Alamy

How China is using AI news anchors to deliver its propaganda

18 May 2024 at 03:00

News avatars are proliferating on social media and experts say they will spread as the technology becomes more accessible

The news presenter has a deeply uncanny air as he delivers a partisan and pejorative message in Mandarin: Taiwan’s outgoing president, Tsai Ing-wen, is as effective as limp spinach, her period in office beset by economic under performance, social problems and protests.

“Water spinach looks at water spinach. Turns out that water spinach isn’t just a name,” says the presenter, in an extended metaphor about Tsai being “Hollow Tsai” – a pun related to the Mandarin word for water spinach.

Continue reading...

💾

© Photograph: Storm-1376

💾

© Photograph: Storm-1376

Yesterday — 17 May 2024Main stream

Think before you click – and three other ways to reduce your digital carbon footprint | Koren Helbig

17 May 2024 at 11:00

The invisible downside to our online lives is the data stored at giant energy-guzzling datacentres

It’s been called “the largest coal-powered machine on Earth” – and most of us use it countless times a day.

The internet and its associated digital industry are estimated to produce about the same emissions annually as aviation. But we barely think about pollution while snapping 16 duplicate photos of our pets, which are immediately uploaded to the cloud.

Continue reading...

💾

© Photograph: David Levene/The Guardian

💾

© Photograph: David Levene/The Guardian

‘I’m the new Oppenheimer!’: my soul-destroying day at Palantir’s first-ever AI warfare conference

17 May 2024 at 10:00

America’s military-industrial complex took center stage at AI Expo for National Competitiveness, where a fire-breathing panel set the tone

On 7 and 8 May in Washington DC, the city’s biggest convention hall welcomed America’s military-industrial complex, its top technology companies and its most outspoken justifiers of war crimes. Of course, that’s not how they would describe it.

It was the inaugural “AI Expo for National Competitiveness”, hosted by the Special Competitive Studies Project – better known as the “techno-economic” thinktank created by the former Google CEO and current billionaire Eric Schmidt. The conference’s lead sponsor was Palantir, a software company co-founded by Peter Thiel that’s best known for inspiring 2019 protests against its work with Immigration and Customs Enforcement (Ice) at the height of Trump’s family separation policy. Currently, Palantir is supplying some of its AI products to the Israel Defense Forces.

Continue reading...

💾

© Photograph: Tasos Katopodis/Getty Images for Palantir

💾

© Photograph: Tasos Katopodis/Getty Images for Palantir

UK engineering firm Arup falls victim to £20m deepfake scam

By: Dan Milmo
17 May 2024 at 08:13

Hong Kong employee was duped into sending cash to criminals by AI-generated video call

The British engineering company Arup has confirmed it was the victim of a deepfake fraud after an employee was duped into sending HK$200m (£20m) to criminals by an artificial intelligence-generated video call.

Hong Kong police said in February that a worker at a then-unnamed company had been tricked into transferring vast sums by people on a hoax call “posing as senior officers of the company”.

Continue reading...

💾

© Photograph: Andrew Brookes/Getty Images/Image Source

💾

© Photograph: Andrew Brookes/Getty Images/Image Source

Protesters vow to keep up pressure on Tesla as it expands German gigafactory

17 May 2024 at 07:58

Town of Grünheide approved the US automaker’s plan on Thursday to double the capacity of the site, despite opposition

Environmental protesters vowed to keep up the pressure on Tesla after failing to stop plans by Elon Musk’s company from expanding its sprawling electric vehicle plant outside Berlin.

The town council of Grünheide, guarded by police and plain-clothed security guards, gave the green light on Thursday to the US automaker after a heated, nearly three-hour debate disrupted by heckling and booing from the audience of about 200 people.

Continue reading...

💾

© Photograph: John MacDougall/AFP/Getty Images

💾

© Photograph: John MacDougall/AFP/Getty Images

Company insolvencies jump; Royal Mail takeover would face security review; energy cap to fall in July – business live

17 May 2024 at 09:54

Tesla’s chair discusses upcoming shareholder votes on relocating to Texas and Elon Musk’s $56bn pay deal

The Sunday Times also reports that the biggest risers on this year’s list are:

Barnaby and Merlin Swire and family, the family’s two-century-old business owns a significant stake in Cathay Pacific and has extensive interests in Hong Kong (£8.82bn)

Idan Ofer, is the son of Sammy Ofer, who built a shipping empire after serving in the Royal Navy during the Second World War (£6.96bn)

John Frederiksen and family, Fredriksen, a Norway-born Cypriot oil and tanker tycoon, has twin daughters who stand to inherit his empire. He owns a Chelsea mansion with a ballroom (£4.556bn)

“We need an economy that rewards work not just wealth.

“But as millions of families struggle to cover even the basics, the super-rich are amassing even greater fortunes.

Continue reading...

💾

© Photograph: Andy Rain/EPA

💾

© Photograph: Andy Rain/EPA

The artist behind the short-lived portal linking New York and Dublin: ‘People got carried away’

17 May 2024 at 03:00

Benediktas Gylys admits he was surprised by the rowdy behavior that came from the exhibit connecting people in the two cities

The artist behind the controversial “Portal” art exhibit that visually linked New York and Dublin in real time, but was then closed due to rowdy and extreme behavior by the public using it, has admitted he was surprised by the reaction.

Benediktas Gylys also vowed to continue with his project, which has the aim of connecting people and communities all over the world and is hoped to reopen soon.

Continue reading...

💾

© Photograph: Brendan McDermid/Reuters

💾

© Photograph: Brendan McDermid/Reuters

Before yesterdayMain stream

Arizona woman accused of helping North Koreans get remote IT jobs at 300 companies

16 May 2024 at 18:49
Illustration of a judge's gavel on a digital background resembling a computer circuit board.

Enlarge (credit: Getty Images | the-lightwriter)

An Arizona woman has been accused of helping generate millions of dollars for North Korea’s ballistic missile program by helping citizens of that country land IT jobs at US-based Fortune 500 companies.

Christina Marie Chapman, 49, of Litchfield Park, Arizona, raised $6.8 million in the scheme, federal prosecutors said in an indictment unsealed Thursday. Chapman allegedly funneled the money to North Korea’s Munitions Industry Department, which is involved in key aspects of North Korea’s weapons program, including its development of ballistic missiles.

Part of the alleged scheme involved Chapman and co-conspirators compromising the identities of more than 60 people living in the US and using their personal information to get North Koreans IT jobs across more than 300 US companies.

Read 7 remaining paragraphs | Comments

Researchers build AI-driven sarcasm detector

16 May 2024 at 10:35

Being able to detect lowest form of wit could help AI interact with people more naturally, say scientists

Never mind that it can pass the bar exam, ace medical tests and read bedtime stories with emotion, artificial intelligence will never match the marvel of the human mind without first mastering the art of sarcasm.

But that art, it seems, may be next on the list of the technology’s dizzying capabilities. Researchers in the Netherlands have built an AI-driven sarcasm detector that can spot when the lowest form of wit, and the highest form of intelligence, is being deployed.

Continue reading...

💾

© Photograph: NBC/Getty Images

💾

© Photograph: NBC/Getty Images

MPs call for issues leaving carers with huge debts to be fixed ‘without delay’

Committee chair says UK government has known for years about flaws in benefit system and needs to ‘get a grip’

A cross-party committee of MPs has urged the government to overhaul the weekly benefit for unpaid carers and fix “without delay” the issues causing thousands to rack up enormous debts.

Mel Stride, the work and pensions secretary, was told that the government had failed for five years to tackle the IT problems that have left tens of thousands of unpaid carers owing sums that had plunged many into debt and left some facing criminal prosecution.

Continue reading...

💾

© Photograph: Pixel Youth movement/Alamy

💾

© Photograph: Pixel Youth movement/Alamy

What’s up with ChatGPT’s new sexy persona? | Arwa Mahdawi

16 May 2024 at 06:15

OpenAI’s updated chatbot GPT-4o is weirdly flirtatious, coquettish and sounds like Scarlett Johansson in Her. Why?

“Any sufficiently advanced technology is indistinguishable from magic,” Arthur C Clarke famously said. And this could certainly be said of the impressive OpenAI update to ChatGPT, called GPT-4o, which was released on Monday. With the slight caveat that it felt a lot like the magician was a horny 12-year-old boy who had just watched the Spike Jonze movie Her.

If you aren’t up to speed on GPT-4o (the o stands for “omni”) it’s basically an all-singing, all-dancing, all-seeing version of the original chatbot. You can now interact with it the same way you’d interact with a human, rather than via text-based questions. It can give you advice, it can rate your jokes, it can describe your surroundings, it can banter with you. It sounds human. “It feels like AI from the movies,” OpenAI CEO Sam Altman said in a blog post on Monday. “Getting to human-level response times and expressiveness turns out to be a big change.”

Continue reading...

💾

© Photograph: Warner Bros./Sportsphoto/Allstar

💾

© Photograph: Warner Bros./Sportsphoto/Allstar

EU investigates Facebook owner Meta over child safety and mental health concerns

16 May 2024 at 07:16

Company’s social media platforms, which also include Instagram, may have addictive effects, says European Commission

Business live – latest updates

The European Commission has opened an investigation into the owner of Facebook and Instagram over concerns that the platforms are creating addictive behaviour among children and damaging mental health.

The EU executive said Meta may have breached the Digital Services Act (DSA), a landmark law passed by the bloc last summer that makes digital companies large and small liable for disinformation, shopping scams, child abuse and other online harms.

Continue reading...

💾

© Photograph: Chesnot/Getty

💾

© Photograph: Chesnot/Getty

Best podcasts of the week: The stone cold truth about the scandal that rocked curling

How can one broom tear apart a Canadian curling community? John Cullen investigates in Broomgate. Plus: five of the best post-apocalyptic podcasts

Don’t get Hear Here delivered to your inbox? Sign up here

Broomgate
Widely available, episodes weekly
Never before has a broom been responsible for so much scandal – in 2015, the Canadian curling community was rocked by a team that used one instead of two. “To not have the other person out front cleaning in a frosty situation doesn’t make sense,” said one shocked commentator. The full story has never been told, so comedian and curling geek John Cullen investigates the switch to the “super broom” that caused a furore. Hannah Verdier

Continue reading...

💾

© Photograph: David Davies/PA

💾

© Photograph: David Davies/PA

AI, algorithms and apps: can dating be boiled down to a science? – podcast

Last week the founder of the dating app Bumble forecasted a near future dating landscape where AI ‘dating concierges’ filter out prospective partners for us. But does AI, or even science, really understand what makes two people compatible? Madeleine Finlay speaks to Amie Gordon, assistant professor of psychology at the University of Michigan, to find out what we know about why two people go the distance, and why she and her colleague associate professor of sociology Elizabeth Bruch, are designing their own dating app to learn more.

Clips: Bloomberg

Read more about Amie’s app here

Continue reading...

💾

© Photograph: Westend61/Getty Images

💾

© Photograph: Westend61/Getty Images

States Dust Off Obscure Anti-Mask Laws to Target Pro-Palestine Protesters

pArcane laws banning people from wearing masks in public are now being used to target people who wear face coverings while peacefully protesting Israel’s war in Gaza. That’s a big problem./p pIn the 1940s and 50s, many U.S. states passed anti-mask laws as a response to the Ku Klux Klan, whose members often hid their identities as they terrorized their victims. These laws were not enacted to protect those victims, but because political leaders wanted to defend segregation as part of a “modern South” and felt that the Klan’s violent racism was making them look bad./p pNow these laws are being used across the country to try and clamp down on disfavored groups and movements, raising questions about selective prosecution. Just this month, Ohio Attorney General Dave Yost a href=https://www.latimes.com/world-nation/story/2024-05-08/masked-student-protesters-could-face-felony-charges-under-anti-kkk-law-ohio-attorney-general-warnssent a letter/a to the state’s 14 public universities alerting them that protesters could be charged with a felony under the state’s little-used anti-mask law, which carries penalties of between six to 18 months in prison. An Ohio legal expert, Rob Barnhart, observed that he’d a href=https://www.wosu.org/politics-government/2024-05-07/protesters-could-face-felony-charge-if-arrested-while-wearing-a-mask-under-obscure-ohio-lawnever heard/a of the state’s law being applied previously, even to bank robbers wearing masks. While Yost framed his letter as “proactive guidance,” Barnhart countered that “I find it really hard to believe that this is some public service announcement to students to be aware of a 70-year-old law that nobody uses.”/p div class=mp-md wp-link div class=wp-link__img-wrapper a href=https://www.aclu.org/news/free-speech/americas-mask-bans-in-the-age-of-face-recognition-surveillance target=_blank tabindex=-1 img width=1200 height=628 src=https://www.aclu.org/wp-content/uploads/2024/05/5b813d014d9877b39c43e882a1782bed.jpg class=attachment-4x3_full size-4x3_full alt= decoding=async loading=lazy srcset=https://www.aclu.org/wp-content/uploads/2024/05/5b813d014d9877b39c43e882a1782bed.jpg 1200w, https://www.aclu.org/wp-content/uploads/2024/05/5b813d014d9877b39c43e882a1782bed-768x402.jpg 768w, https://www.aclu.org/wp-content/uploads/2024/05/5b813d014d9877b39c43e882a1782bed-400x209.jpg 400w, https://www.aclu.org/wp-content/uploads/2024/05/5b813d014d9877b39c43e882a1782bed-600x314.jpg 600w, https://www.aclu.org/wp-content/uploads/2024/05/5b813d014d9877b39c43e882a1782bed-800x419.jpg 800w, https://www.aclu.org/wp-content/uploads/2024/05/5b813d014d9877b39c43e882a1782bed-1000x523.jpg 1000w sizes=(max-width: 1200px) 100vw, 1200px / /a /div div class=wp-link__title a href=https://www.aclu.org/news/free-speech/americas-mask-bans-in-the-age-of-face-recognition-surveillance target=_blank America's Mask Bans in the Age of Face Recognition Surveillance /a /div div class=wp-link__description a href=https://www.aclu.org/news/free-speech/americas-mask-bans-in-the-age-of-face-recognition-surveillance target=_blank tabindex=-1 p class=is-size-7-mobile is-size-6-tabletAmerican laws should allow people the freedom to cover up their faces in protests or anywhere else./p /a /div div class=wp-link__source p-4 px-6-tablet a href=https://www.aclu.org/news/free-speech/americas-mask-bans-in-the-age-of-face-recognition-surveillance target=_blank tabindex=-1 p class=is-size-7Source: American Civil Liberties Union/p /a /div /div pOhio officials aren’t the only ones who seem to be selectively enforcing anti-mask laws against student protestors. Administrators at the University of North Carolina a href=https://chapelboro.com/news/unc/unc-asks-pro-palestine-protesters-to-stop-wearing-masks-citing-1953-anti-kkk-lawhave warned/a protesters that wearing masks violates the state’s anti-mask law and “runs counter to our campus norms and is a violation of UNC policy.” Students arrested during a protest at the University of Florida were a href=https://www.sun-sentinel.com/2024/04/29/police-make-first-arrests-in-florida-of-pro-palestinian-protesters-at-two-university-campuses/charged with/a, among other things, wearing masks in public. At the University of Texas at Austin, Gov. Greg Abbott and university officials called in state troopers to a href=https://www.texastribune.org/2024/04/29/university-texas-pro-palestinian-protest-arrest/violently/a break up pro-Palestinian protests after the school a href=https://www.houstonchronicle.com/politics/texas/article/ut-austin-police-protest-arrests-19422645.phprescinded permission/a for a rally on the grounds that protesters had a “declared intent to violate our policies and rules.” One of the rules the administrators cited was a university ban on wearing face masks “to obstruct law enforcement.”/p pAt a time when both public and private actors are increasingly turning to invasive surveillance technologies to identify protesters, mask-wearing is an important way for us to safeguard our right to speak out on issues of public concern. While the ACLU has raised concerns about how anti-mask laws have been wielded for decades, we are especially worried about the risk they pose to our constitutional freedoms in the digital age./p pIn particular, the emergence of face recognition technology has changed what it means to appear in public. Increasingly omnipresent cameras and corrosive technology products such as a href=https://www.nytimes.com/interactive/2021/03/18/magazine/facial-recognition-clearview-ai.htmlClearview AI/a allow police to easily identify people. So, too, can private parties. The push to normalize face recognition by security agencies threatens to turn our faces into the functional equivalent of license plates. Anti-mask laws are in effect a requirement to display those “plates” anytime one is in public. Humans are not cars./p pOf course, mask-wearing is not just about privacy — it can also be an expressive act, a religious practice, a political statement, or a public-health measure. The ACLU has chronicled the a href=https://www.aclu.org/news/free-speech/americas-mask-bans-in-the-age-of-face-recognition-surveillancemask-wearing debate/a for years. As recently as 2019, anti-mask laws were used against a href=https://www.theatlantic.com/national/archive/2011/09/nypd-arresting-wall-street-protesters-wearing-masks/337706/Occupy Wall Street/a protesters,a href=https://www.ajc.com/news/state--regional/white-nationalist-richard-spencer-riles-auburn-campus-three-arrested/5HeaD0TCfvfNI7DuXDUciJ/ anti-racism/aa href=https://wtvr.com/2017/09/19/mask-in-public-court-hearing/ protesters/a, anda href=https://wbhm.org/feature/2019/experts-alabamas-mask-law-is-outdated/ police violence/a protesters. The coronavirus temporarily scrambled the mask-wearing debate and made a mask both a protective and a a href=https://apnews.com/article/virus-outbreak-donald-trump-ap-top-news-politics-health-7dce310db6e85b31d735e81d0af6769cpolitical/a act./p pToday, one question that remains is whether and how the authorities distinguish between those who are wearing a mask to protect their identities and those who are wearing one to protect themselves against disease. That ambiguity opens up even more space for discretionary and selective enforcement. In North Carolina, the state Senate is currently considering an anti-protest bill that would remove the exception for wearing a mask for health purposes altogether, and would add a sentencing enhancement for committing a crime while wearing a mask./p pFor those speaking out in support of the Palestinian people, being recognized in a crowd can have extreme consequences for their personal and professional security. During the Gaza protests, pro-Israel activists and organizations have posted the faces and personal information of pro-Palestine activists to intimidate them, get them fired, or otherwise shame them for their views. These doxing attempts have intensified, with viral videos showing counterprotesters demanding that pro-Palestinian protesters remove their masks at rallies. Professionally, employers have a href=https://www.thecut.com/2023/10/israel-hamas-war-job-loss-social-media.htmlterminated workers/a for their comments about Israel and Palestine, and CEOs have a href=https://finance.yahoo.com/news/bill-ackman-wants-harvard-name-104621975.htmldemanded/a universities give them the names of protesters in order to blacklist them from jobs./p pWhile wearing a mask can make it harder to identify a person, it#8217;s important for protesters to know that it’s not always effective. Masks haven’t stopped the a href=https://www.nytimes.com/2022/12/02/business/china-protests-surveillance.htmlChinese government/a or a href=https://www.cbsnews.com/sanfrancisco/news/google-workers-fired-after-protesting-israeli-contract-file-complaint-labor-regulators/Google/a, for example, from identifying protesters and taking action against them. Technologies that can be used to identify masked protesters range froma href=https://www.notus.org/technology/war-zone-surveillance-border-us Bluetooth and WiFi signals/a, to historical cell phone location data, to constitutionally dubious devices calleda href=https://www.aclu.org/news/privacy-technology/police-citing-terrorism-buy-stingrays-used-only IMSI Catchers/a, which pretend to be a cell tower and ping nearby phones, prompting phones to reply with an identifying ping of their own. We may also see the development of a href=https://www.aclu.org/publications/dawn-robot-surveillancevideo analytics/a technologies that use gait recognition or body-proportion measurements. During Covid, face recognition also got a href=https://www.bbc.com/news/technology-56517033much/aa href=https://www.zdnet.com/article/facial-recognition-now-algorithms-can-see-through-face-masks/ better/a at identifying people wearing partial face masks./p pProtecting people’s freedom to wear masks can have consequences. It can make it harder to identify people who commit crimes, whether they are bank robbers, muggers, or the members of the “a href=https://www.latimes.com/california/story/2024-05-07/a-ucla-timeline-from-peaceful-encampment-to-violent-attacks-aftermathviolent mob/a” that attacked a peaceful protest encampment at UCLA. Like all freedoms, the freedom to wear a mask can be abused. But that does not justify taking that freedom away from those protesting peacefully, especially in today’s surveillance environment./p pAnti-mask laws, undoubtedly, have a significant chilling effect on some protesters#8217; willingness to show up for causes they believe in. The bravery of those who do show up to support a highly-controversial cause in the current surveillance landscape is admirable, but Americans shouldn’t have to be brave to exercise their right to protest. Until privacy protections catch up with technology, officials and policymakers should do all they can to make it possible for less-brave people to show up and protest. That includes refusing to use anti-mask laws to target peaceful protestors./p

Wild Diamond review – French social-realist drama fuelled by TikTok energy

15 May 2024 at 11:43

Cannes film festival
First-time actor Agathe Riedinger is a wannabe influencer from the wrong side of the tracks in this forthright and fluent film

Feature first-timer Agathe Riedinger is bringing the TikTok energy for this story of a wannabe Insta influencer-princess from the wrong side of the tracks – but the director is also bringing some pretty old school social realism, exerting its downward gravitational pull. The result is forthright and fluent and fiercely acted by a newcomer lead who, in the time-honoured style of movies like this, is defiant, vulnerable and front and centre of almost every shot. But it also sometimes treads water in terms of narrative, running out of ideas before the end, and its final ambiguity about an ultimate success that is there to be hallucinated rather than achieved feels anticlimactic.

Liane, played by Malou Khebizi, is a 19-year-old with a French and Italian background living in Fréjus in the south of France. She was once given up for foster care by her troubled mother but now taken back home and is now in charge of babysitting her kid sister, whom she is busily turning into a mini-me version of her own brassy, sexualised image. Liane shoplifts and sells the stolen goods – which has paid for her breast-implant surgery and she has also had her lips done. She hangs out with her friends, getting drunk, but is fastidious about how and with whom she’s having sex; she has thousands of followers on her Only-Fans-type insta (although oddly, it doesn’t occur to her to have an actual Only Fans account). Liane also has a poignantly religious sense of her own heroic martyrdom, her ill-treatment at the hands of online haters, men and her appalling mother.

Continue reading...

💾

© Photograph: Silex Films

💾

© Photograph: Silex Films

Raspberry Pi: how push for child programming skills inspired a coding generation

15 May 2024 at 10:35

Company’s cheap, simple-to-use durable minicomputer has proved a hit all over the world

Raspberry Pi, whose popular minicomputers are sold around the world, has come a long way since its co-founder Jack Lang had to store some of the first batch of single-board devices in his garage more than a decade ago.

What started out as a project to reverse the decline in computer science applications at Cambridge University went on to inspire a generation of child programmers by offering them an affordable $35 (£28) minicomputer. Now the company is preparing to list on the London Stock Exchange.

Continue reading...

💾

© Photograph: Mark Hawkins/Alamy

💾

© Photograph: Mark Hawkins/Alamy

AI Program Aims to Break Barriers for Female Students

A new program, backed by Cornell Tech, M.I.T. and U.C.L.A., helps prepare lower-income, Latina and Black female computing majors for artificial intelligence careers.

The Break Through Tech A.I. program provides young women with learning and career opportunities in artificial intelligence.

iPad Pro M4 review: ludicrously good hardware that’s total overkill for most

Apple sets new standard in screen and power but Pro model verges away from consumer tablet needs

Apple’s latest iPad Pro is thinner and lighter, and has a stupendous new OLED screen, plus oodles of power to do practically anything. But it is no longer just the super-premium iPad – it is also aiming to be an impressive tool for the creative industry.

It still looks and acts like an iPad, ready to do regular iPad things such as browse the web, watch TV or chat to your family on the other side of the country. But to do only that with a machine this advanced is total overkill – Apple has many other iPad models suited to that sort of thing.

Continue reading...

💾

© Photograph: Samuel Gibbs/The Guardian

💾

© Photograph: Samuel Gibbs/The Guardian

Dublin To New York City Portal Temporarily Shut Down Due To Inappropriate Behavior

By: msmash
14 May 2024 at 17:30
A portal linking New York City to Dublin via a livestream has been temporarily shut down after inappropriate behavior ensued, according to the Dublin City Council. From a report: Less than a week after the 24/7 visual art installation was put in place, officials have opted to close it down temporarily after people began to flash each other, grind on the portal, and one person even shared pictures of the twin tower attack to people in New York City. Alternatively, the portal had also been the site of reunions with old friends and even a proposal, with many documenting their experience with the installation online. The Dublin City Council said that although those engaged in the inappropriate behavior were few and far between, videos of said behavior went viral online. "While we cannot control all of these actions, we are implementing some technical solutions to address this and these will go live in the next 24 hours," the council said in a Monday statement. "We will continue to monitor the situation over the coming days with our partners in New York to ensure that portals continue to deliver a positive experience for both cities and the world."

Read more of this story at Slashdot.

Coalition to Calexico: Think Twice About Reapproving Border Surveillance Tower Next to a Public Park

14 May 2024 at 16:23

Update May 15, 2024: The letter has been updated to include support from the Southern Border Communities Coalition. It was re-sent to the Calexico City Council. 

On the southwest side of Calexico, a border town in California’s Imperial Valley, a surveillance tower casts a shadow over a baseball field and a residential neighborhood. In 2000, the Immigration and Naturalization Service (the precursor to the Department of Homeland Security (DHS)) leased the corner of Nosotros Park from the city for $1 a year for the tower. But now the lease has expired, and DHS component Customs & Border Protection (CBP) would like the city to re-up the deal 

Map of Nosotros park with location of tower

But times—and technology—have changed. CBP’s new strategy calls for adopting powerful artificial intelligence technology to not only control the towers, but to scan, track and categorize everything they see.  

Now, privacy and social justice advocates including the Imperial Valley Equity and Justice Coalition, American Friends Service Committee, Calexico Needs Change, and Southern Border Communities Coalition have joined EFF in sending the city council a letter urging them to not sign the lease and either spike the project or renegotiate it to ensure that civil liberties and human rights are protected.  

The groups write 

The Remote Video Surveillance System (RVSS) tower at Nosotros Park was installed in the early 2000s when video technology was fairly limited and the feeds required real-time monitoring by human personnel. That is not how these cameras will operate under CBP's new AI strategy. Instead, these towers will be controlled by algorithms that will autonomously detect, identify, track and classify objects of interest. This means that everything that falls under the gaze of the cameras will be scanned and categorized. To an extent, the AI will autonomously decide what to monitor and recommend when Border Patrol officers should be dispatched. While a human being may be able to tell the difference between children playing games or residents getting ready for work, AI is prone to mistakes and difficult to hold accountable. 

In an era where the public has grave concerns on the impact of unchecked technology on youth and communities of color, we do not believe enough scrutiny and skepticism has been applied to this agreement and CBP's proposal. For example, the item contains very little in terms of describing what kinds of data will be collected, how long it will be stored, and what measures will be taken to mitigate the potential threats to privacy and human rights. 

The letter also notes that CBP’s tower programs have repeatedly failed to achieve the promised outcomes. In fact, the DHS Inspector General found that the early 2000s program,yielded few apprehensions as a percentage of detection, resulted in needless investigations of legitimate activity, and consumed valuable staff time to perform video analysis or investigate sensor alerts.”  

The groups are calling for Calexico to press pause on the lease agreement until CBP can answer a list of questions about the impact of the surveillance tower on privacy and human rights. Should the city council insist on going forward, they should at least require regular briefings on any new technologies connected to the tower and the ability to cancel the lease on much shorter notice than the 365 days currently spelled out in the proposed contract.  

Backstabbing, bluffing and playing dead: has AI learned to deceive? – podcast

As AI systems have grown in sophistication, so has their capacity for deception, according to a new analysis from researchers at Massachusetts Institute of Technology (MIT). Dr Peter Park, an AI existential safety researcher at MIT and author of the research, tells Ian Sample about the different examples of deception he uncovered, and why they will be so difficult to tackle as long as AI remains a black box

Listen to the Guardian’s Black Box series all about humans and artificial intelligence

Read Hannah Devlin’s article about the MIT study

Continue reading...

💾

© Photograph: Justin Tallis/AFP/Getty Images

💾

© Photograph: Justin Tallis/AFP/Getty Images

"Well, you seem like a person, but you're just a voice in a computer"

By: Rhaomi
13 May 2024 at 15:14
OpenAI unveils GPT-4o, a new flagship "omnimodel" capable of processing text, audio, and video. While it delivers big improvements in speed, cost, and reasoning ability, perhaps the most impressive is its new voice mode -- while the old version was a clunky speech --> text --> speech approach with tons of latency, the new model takes in audio directly and responds in kind, enabling real-time conversations with an eerily realistic voice, one that can recognize multiple speakers and even respond with sarcasm, laughter, and other emotional content of speech. Rumor has it Apple has neared a deal with the company to revamp an aging Siri, while the advance has clear implications for customer service, translation, education, and even virtual companions (or perhaps "lovers", as the allusions to Spike Jonze's Her, the Samantha-esque demo voice, and opening the door to mature content imply). Meanwhile, the offloading of most premium ChatGPT features to the free tier suggests something bigger coming down the pike.

Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools

By: Tom Eston
13 May 2024 at 00:00

In this first-ever in-person recording of Shared Security, Tom and Kevin, along with special guest Matt Johansen from Reddit, discuss their experience at the RSA conference in San Francisco, including their walk-through of ‘enhanced security’ and the humorous misunderstanding that ensued. The conversation moves to the ubiquity of AI and machine learning buzzwords at the […]

The post Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools appeared first on Shared Security Podcast.

The post Live at RSA: AI Hype, Enhanced Security, and the Future of Cybersecurity Tools appeared first on Security Boulevard.

💾

MoD contractor hacked by China failed to report breach for months – Source: www.theguardian.com

mod-contractor-hacked-by-china-failed-to-report-breach-for-months-–-source:-wwwtheguardian.com

Source: www.theguardian.com – Author: Anna Isaac and Dan Sabbagh The IT company targeted in a Chinese hack that accessed the data of hundreds of thousands of Ministry of Defence staff failed to report the breach for months, the Guardian can reveal. The UK defence secretary, Grant Shapps, told MPs on Tuesday that Shared Services Connected […]

La entrada MoD contractor hacked by China failed to report breach for months – Source: www.theguardian.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

Meet Kevin’s A.I. Friends

They gave him notes on his outfits and reassurance before a big talk, and they shared made-up gossip about each other.

© Photo Illustration by The New York Times; Illustration: Jason Allen Lee

Biden Announces $3.3 Billion Microsoft AI Center at Trump’s Failed Foxconn Site

8 May 2024 at 16:27
The president’s visit to Wisconsin celebrated the investment by Microsoft in a center to be built on the site of a failed Foxconn project negotiated by his predecessor.

© Tom Brenner for The New York Times

President Biden at the Intel campus in Chandler, Ariz., in March. His “Investing in America” agenda has focused on bringing billions of private-sector dollars into manufacturing and industries such as clean energy and artificial intelligence.

U.S. Tightens Rules on Risky Virus Research

A long-awaited new policy broadens the type of regulated viruses, bacteria, fungi and toxins, including those that could threaten crops and livestock.

© Karen Ducey/Getty Images

Working inside a biosafety Level 3 lab at the University of Washington School of Medicine in 2020.

Add Bluetooth to the Long List of Border Surveillance Technologies

A new report from news outlet NOTUS shows that at least two Texas counties along the U.S.-Mexico border have purchased a product that would allow law enforcement to track devices that emit Bluetooth signals, including cell phones, smartwatches, wireless earbuds, and car entertainment systems. This incredibly personal model of tracking is the latest level of surveillance infrastructure along the U.S.-Mexico border—where communities are not only exposed to a tremendous amount of constant monitoring, but also serves as a laboratory where law enforcement agencies at all levels of government test new technologies.

The product now being deployed in Texas, called TraffiCatch, can detect wifi and Bluetooth signals in moving cars to track them. Webb County, which includes Laredo, has had TraffiCatch technology since at least 2019, according to GovSpend procurement data. Val Verde County, which includes Del Rio, approved the technology in 2022. 

This data collection is possible because all Bluetooth devices regularly broadcast a Bluetooth Device Address. This address can be either a public address or a random address. Public addresses don’t change for the lifetime of the device, making them the easiest to track. Random addresses are more common and have multiple levels of privacy, but for the most part change regularly (this is the case with most modern smartphones and products like AirTags.) Bluetooth products with random addresses would be hard to track for a device that hasn’t paired with them. But if the tracked person is also carrying a Bluetooth device that has a public address, or if tracking devices are placed close to each other so a device is seen multiple times before it changes its address, random addresses could be correlated with that person over long periods of time.

It is unclear whether TraffiCatch is doing this sort of advanced analysis and correlation, and how effective it would be at tracking most modern Bluetooth devices.

According to TraffiCatch’s manufacturer, Jenoptik, this data derived from Bluetooth is also combined with data collected from automated license plate readers, another form of vehicle tracking technology placed along roads and highways by federal, state, and local law enforcement throughout the Texas border. ALPRs are well understood technology for vehicle tracking, but the addition of Bluetooth tracking may allow law enforcement to track individuals even if they are using different vehicles.

This mirrors what we already know about how Immigration and Customs Enforcement (ICE) has been using cell-site simulators (CSSs). Also known as Stingrays or IMSI catchers, CSS are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower. In 2023, the Department of Homeland Security’s Inspector General released a troubling report detailing how federal agencies like ICE, its subcomponent Homeland Security Investigations (HSI), and the Secret Service have conducted surveillance using CSSs without proper authorization and in violation of the law. Specifically, the Inspector General found that these agencies did not adhere to federal privacy policy governing the use of CSS and failed to obtain special orders required before using these types of surveillance devices.

Law enforcement agencies along the border can pour money into overlapping systems of surveillance that monitor entire communities living along the border thanks in part to Operation Stonegarden (OPSG), a Department of Homeland Security (DHS) grant program, which rewards state and local police for collaborating in border security initiatives. DHS doled out $90 million in OPSG funding in 2023, $37 million of which went to Texas agencies. These programs are especially alarming to human rights advocates due to recent legislation passed in Texas to allow local and state law enforcement to take immigration enforcement into their own hands.

As a ubiquitous wireless interface to many of our personal devices and even our vehicles, Bluetooth is a large and notoriously insecure attack surface for hacks and exploits. And as TraffiCatch demonstrates, even when your device’s Bluetooth tech isn’t being actively hacked, it can broadcast uniquely identifiable information that make you a target for tracking. This is one in the many ways surveillance, and the distrust it breeds in the public over technology and tech companies, hinders progress. Hands-free communication in cars is a fantastic modern innovation. But the fact that it comes at the cost of opening a whole society up to surveillance is a detriment to all.

A.I. at Your Jobs + Hank Green Talks TikTok + Deepfake High School

A synthetic chief executive, a bot trained on employees’ personalities, and a regular duel with ChatGPT — our listeners brought us their stories.

© Photo Illustration by The New York Times; Image: Tom and Steve, via Getty Images

Some NASA Satellites Will Soon Stop Sending Data Back to Earth

3 May 2024 at 16:47
Three long-running satellites will soon be switched off, forcing scientists to figure out how to adjust their views of our changing planet.

© NASA/GSFC/LaRC/JPL, MISR Team

Marine stratocumulus clouds over the southeastern Pacific Ocean, captured by NASA’s Terra satellite in 2002.

Watch out for tech support scams lurking in sponsored search results

2 May 2024 at 11:14

This blog post was written based on research carried out by Jérôme Segura.

A campaign using sponsored search results is targeting home users and taking them to tech support scams.

Sponsored search results are the ones that are listed at the top of search results and are labelled “Sponsored”. They’re often ads that are taken out by brands who want to get people to click through to their website. In the case of malicious sponsored ads, scammers tend to outbid the brands in order to be listed as the first search result.

The criminals that buy the ads will go as far as displaying the official brand’s website within the ad snippet, making it hard for an unsuspecting visitor to notice a difference.

Who would, for example, be able to spot that the below ad for CNN is not legitimate. You’ll have to click on the three dots (in front of where we added malicious ad) and look at the advertiser information to see that it’s not the legitimate owner of the brand.

fake CNN sponsored ad

Only then it becomes apparent that the real advertiser is not CNN, but instead a company called Yojoy Network Technology Co., Limited.

Google Ads Transparency Center entry for Yojoy Network Technology

Below, you can see another fake advertisement by the same advertiser, this time impersonating Amazon.

Another fake ad by Yojoy impersonating Amazon

In our example, the scammers failed to use the correct CNN or Amazon icons, but in other cases (like another recent discovery by Jerome Segura), scammers have even used the correct icon.

fake ad for Wall Street Journal

The systems of the people that click one of these links are likely to assessed on what the most profitable follow-up is (using a method called fingerprinting). For systems running Windows, we found visitors are redirected to tech support scam websites such as this one.

Typical Fake Microsoft alert page with popups, prompts all telling the visitor to call 1-844-476-5780 (tech support scammers)

Tech Support Scam site telling the visitor to call 1-844-476-5780

You undoubtedly know the type. Endless pop-ups, soundbites, and prompts telling the visitor that they should urgently call the displayed number to free their system of alleged malware.

These tech support scammers will impersonate legitimate software companies (i.e. Microsoft) and charge their victims hundreds or even thousands of dollars for completely bogus malware removal.

Getting help if you have been scammed

Getting scammed is one of the worst feelings to experience. In many ways, you may feel like you have been violated and angry to have let your guard down. Perhaps you are even shocked and scared, and don’t really know what to do now. The following tips will hopefully provide you with some guidance.

If you’ve already let the scammers in

  • Revoke any remote access the scammer has (if you are unsure, restart your computer). That should cut the remote session and kick them out of your computer.
  • Scan your computer for malware. The miscreants may have installed password stealers or other Trojans to capture your keystrokes. Use a program such as Malwarebytes to quickly identify and remove threats.
  • Change all your passwords. (Windows password, email, banking, etc.)

If you’ve already paid

  • Contact your financial institution/credit card company to reverse the charges and keep an eye out for future unwanted charges.
  • If you gave them personal information such as date of birth, Social Security Number, full address, name, and maiden name, you may want to look at some form of identity theft protection.

Reporting the scam

File a report

Shut down their remote software account

  • Write down the TeamViewer ID (9-digit code) and send it to TeamViewer’s support. They can later use the information you provide to block people/companies.
  • LogMeIn: Report abuse

Spread the word

You can raise awareness by letting your friends, family, and other acquaintances know what happened to you. Although sharing your experience of falling victim to these scams may be embarrassing, educating other people will help someone caught in a similar situation and deter further scam attempts.


We don’t just report on threats – we help safeguard your entire digital identity

Cybersecurity risks should never spread beyond a headline. Protect your—and your family’s—personal information by using identity protection

Police Say a Simple Warning Will Prevent Face Recognition Wrongful Arrests. That's Just Not True.

pFace recognition technology in the hands of police is dangerous. Police departments across the country frequently use the technology to try to identify images of unknown suspects by comparing them to large photo databases, but it often fails to generate a correct match. And numerous a href=https://www.washingtonpost.com/technology/2019/12/19/federal-study-confirms-racial-bias-many-facial-recognition-systems-casts-doubt-their-expanding-use/studies/a have shown that face recognition technology misidentifies Black people and other people of color at higher rates than white people. To date, there have been at least seven wrongful arrests we know of in the United States due to police reliance on incorrect face recognition results — and those are just the known cases. In nearly every one of those instances, a href=https://www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.htmlthe/a a href=https://www.nytimes.com/2023/03/31/technology/facial-recognition-false-arrests.htmlperson/a a href=https://www.newyorker.com/magazine/2023/11/20/does-a-i-lead-police-to-ignore-contradictory-evidence/wrongfully/a a href=https://www.nytimes.com/2023/08/06/business/facial-recognition-false-arrest.htmlarrested/a a href=https://www.nytimes.com/2020/12/29/technology/facial-recognition-misidentify-jail.htmlwas/a a href=https://www.freep.com/story/news/local/michigan/detroit/2020/07/10/facial-recognition-detroit-michael-oliver-robert-williams/5392166002/Black/a./p pSupporters of police using face recognition technology often portray these failures as unfortunate mistakes that are unlikely to recur. Yet, they keep coming. Last year, six Detroit police officers showed up at the doorstep of an a href=https://www.nytimes.com/2023/08/06/business/facial-recognition-false-arrest.htmleight-months pregnant woman/a and wrongfully arrested her in front of her children for a carjacking that she could not plausibly have committed. A month later, the prosecutor dismissed the case against her./p div class=mp-md wp-link div class=wp-link__img-wrapper a href=https://www.aclu.org/news/privacy-technology/i-did-nothing-wrong-i-was-arrested-anyway target=_blank tabindex=-1 img width=2800 height=1400 src=https://www.aclu.org/wp-content/uploads/2021/07/Robert-Williams-Full-Bleed.jpg class=attachment-4x3_full size-4x3_full alt=Robert Williams and his daughter, Rosie Williams decoding=async loading=lazy srcset=https://www.aclu.org/wp-content/uploads/2021/07/Robert-Williams-Full-Bleed.jpg 2800w, https://www.aclu.org/wp-content/uploads/2021/07/Robert-Williams-Full-Bleed-768x384.jpg 768w, https://www.aclu.org/wp-content/uploads/2021/07/Robert-Williams-Full-Bleed-1536x768.jpg 1536w, https://www.aclu.org/wp-content/uploads/2021/07/Robert-Williams-Full-Bleed-2048x1024.jpg 2048w, https://www.aclu.org/wp-content/uploads/2021/07/Robert-Williams-Full-Bleed-400x200.jpg 400w, https://www.aclu.org/wp-content/uploads/2021/07/Robert-Williams-Full-Bleed-600x300.jpg 600w, https://www.aclu.org/wp-content/uploads/2021/07/Robert-Williams-Full-Bleed-800x400.jpg 800w, https://www.aclu.org/wp-content/uploads/2021/07/Robert-Williams-Full-Bleed-1000x500.jpg 1000w, https://www.aclu.org/wp-content/uploads/2021/07/Robert-Williams-Full-Bleed-1200x600.jpg 1200w, https://www.aclu.org/wp-content/uploads/2021/07/Robert-Williams-Full-Bleed-1400x700.jpg 1400w, https://www.aclu.org/wp-content/uploads/2021/07/Robert-Williams-Full-Bleed-1600x800.jpg 1600w sizes=(max-width: 2800px) 100vw, 2800px / /a /div div class=wp-link__title a href=https://www.aclu.org/news/privacy-technology/i-did-nothing-wrong-i-was-arrested-anyway target=_blank I Did Nothing Wrong. I Was Arrested Anyway. /a /div div class=wp-link__description a href=https://www.aclu.org/news/privacy-technology/i-did-nothing-wrong-i-was-arrested-anyway target=_blank tabindex=-1 p class=is-size-7-mobile is-size-6-tabletOver a year after a police face recognition tool matched me to a crime I did not commit, my family still feels the impact. We must stop this.../p /a /div div class=wp-link__source p-4 px-6-tablet a href=https://www.aclu.org/news/privacy-technology/i-did-nothing-wrong-i-was-arrested-anyway target=_blank tabindex=-1 p class=is-size-7Source: American Civil Liberties Union/p /a /div /div pPolice departments should be doing everything in their power to avoid wrongful arrests, which can turn people’s lives upside down and result in loss of work, inability to care for children, and other harmful consequences. So, what’s behind these repeated failures? As the ACLU explained in a a href=https://www.aclu.org/documents/aclu-comment-facial-recognition-and-biometric-technologies-eo-14074-13erecent submission/a to the federal government, there are multiple ways in which police use of face recognition technology goes wrong. Perhaps most glaring is that the most widely adopted police policy designed to avoid false arrests in this context emsimply does not work/em. Records from the wrongful arrest cases demonstrate why./p pIt has become standard practice among police departments and companies making this technology to warn officers that a result from a face recognition search does not constitute a positive identification of a suspect, and that additional investigation is necessary to develop the probable cause needed to obtain an arrest warrant. For example, the International Association of Chiefs of Police a href=https://www.theiacp.org/sites/default/files/2019-10/IJIS_IACP%20WP_LEITTF_Facial%20Recognition%20UseCasesRpt_20190322.pdfcautions/a that a face recognition search result is “a strong clue, and nothing more, which must then be corroborated against other facts and investigative findings before a person can be determined to be the subject whose identity is being sought.” The Detroit Police Department’s face recognition technology a href=https://detroitmi.gov/sites/detroitmi.localhost/files/2020-10/307.5%20Facial%20Recognition.pdfpolicy/a adopted in September 2019 similarly states that a face recognition search result is only an “an investigative lead and IS NOT TO BE CONSIDERED A POSITIVE IDENTIFICATION OF ANY SUBJECT. Any possible connection or involvement of any subject to the investigation must be determined through further investigation and investigative resources.”/p div class=mp-md wp-link div class=wp-link__img-wrapper a href=https://www.aclu.org/documents/aclu-comment-facial-recognition-and-biometric-technologies-eo-14074-13e target=_blank tabindex=-1 /a /div div class=wp-link__title a href=https://www.aclu.org/documents/aclu-comment-facial-recognition-and-biometric-technologies-eo-14074-13e target=_blank ACLU Comment re: Request for Comment on Law Enforcement Agencies' Use of Facial Recognition Technology, Other Technologies Using Biometric Information, and Predictive Algorithms (Exec. Order 14074, Section 13(e)) /a /div div class=wp-link__description a href=https://www.aclu.org/documents/aclu-comment-facial-recognition-and-biometric-technologies-eo-14074-13e target=_blank tabindex=-1 p class=is-size-7-mobile is-size-6-tablet/p /a /div div class=wp-link__source p-4 px-6-tablet a href=https://www.aclu.org/documents/aclu-comment-facial-recognition-and-biometric-technologies-eo-14074-13e target=_blank tabindex=-1 p class=is-size-7Source: American Civil Liberties Union/p /a /div /div pPolice departments across the country, from a href=https://lacris.org/LACRIS Facial Recognition Policy v_2019.pdfLos Angeles County/a to the a href=https://www.in.gov/iifc/files/Indiana_Intelligence_Fusion_Center_Face_Recognition_Policy.pdfIndiana State Police/a, to the U.S. a href=https://www.dhs.gov/sites/default/files/2023-09/23_0913_mgmt_026-11-use-face-recognition-face-capture-technologies.pdfDepartment of Homeland Security/a, provide similar warnings. However ubiquitous, these warnings have failed to prevent harm./p pWe’ve seen police treat the face recognition result as a positive identification, ignoring or not understanding the warnings that face recognition technology is simply not reliable enough to provide a positive identification./p pIn Louisiana, for example, police relied solely on an incorrect face recognition search result from Clearview AI as purported probable cause for an arrest warrant. The officers did this even though the law enforcement agency signed a contract with the face recognition company acknowledging officers “must conduct further research in order to verify identities or other data generated by the [Clearview] system.” That overreliance led to a href=https://www.nytimes.com/2023/03/31/technology/facial-recognition-false-arrests.htmlRandal Quran Reid/a, a Georgia resident who had never even been to Louisiana, being wrongfully arrested for a crime he couldn’t have committed and held for nearly a week in jail./p pIn an a href=https://www.courierpress.com/story/news/local/2023/10/19/evansville-police-using-clearview-ai-facial-recognition-to-make-arrests/70963350007/Indiana investigation/a, police similarly obtained an arrest warrant based only upon an assertion that the detective “viewed the footage and utilized the Clearview AI software to positively identify the female suspect.” No additional confirmatory investigation was conducted./p pBut even when police do conduct additional investigative steps, those steps often emexacerbate and compound/em the unreliability of face recognition searches. This is a particular problem when police move directly from a facial recognition result to a witness identification procedure, such as a photographic lineup./p pFace recognition technology is designed to generate a list of faces that are emsimilar/em to the suspect’s image, but often will not actually be a match. When police think they have a match, they frequently ask a witness who saw the suspect to view a photo lineup consisting of the image derived from the face recognition search, plus five “filler” photos of other people. Photo lineups have long been known to carry a high risk of misidentification. The addition of face recognition-generated images only makes it worse. Because the face recognition-generated image is likely to appear more similar to the suspect than the filler photos, there is a a href=https://www.newyorker.com/magazine/2023/11/20/does-a-i-lead-police-to-ignore-contradictory-evidence/heightened chance/a that a witness will a href=https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4101826mistakenly choose/a that image out of the lineup, even though it is not a true match./p pThis problem has contributed to known cases of wrongful arrests, including the arrests of a href=https://www.nytimes.com/2023/08/06/business/facial-recognition-false-arrest.htmlPorcha Woodruff/a, a href=https://www.freep.com/story/news/local/michigan/detroit/2020/07/10/facial-recognition-detroit-michael-oliver-robert-williams/5392166002/Michael Oliver/a, and a href=https://www.nytimes.com/2020/06/24/technology/facial-recognition-arrest.htmlRobert Williams/a by Detroit police (the ACLU represents Mr. Williams in a a href=https://www.aclu.org/news/privacy-technology/i-did-nothing-wrong-i-was-arrested-anywaywrongful arrest lawsuit/a). In these cases, police obtained an arrest warrant based solely on the combination of a false match from face recognition technology; and a false identification from a witness viewing a photo lineup that was constructed around the face recognition lead and five filler photos. Each of the witnesses chose the face recognition-derived false match, instead of deciding that the suspect did not, in fact, appear in the lineup./p pA lawsuit filed earlier this year in Texas alleges that a similar series of failures led to the wrongful arrest of a href=https://www.theguardian.com/technology/2024/jan/22/sunglass-hut-facial-recognition-wrongful-arrest-lawsuit?ref=upstract.comHarvey Eugene Murphy Jr./a by Houston police. And in New Jersey, police wrongfully arrested a href=https://www.nytimes.com/2020/12/29/technology/facial-recognition-misidentify-jail.htmlNijeer Parks/a in 2019 after face recognition technology incorrectly flagged him as a likely match to a shoplifting suspect. An officer who had seen the suspect (before he fled) viewed the face recognition result, and said he thought it matched his memory of the suspect’s face./p pAfter the Detroit Police Department’s third wrongful arrest from face recognition technology became public last year, Detroit’s chief of police a href=https://www.facebook.com/CityofDetroit/videos/287218473992047acknowledged/a the problem of erroneous face recognition results tainting subsequent witness identifications. He explained that by moving straight from face recognition result to lineup, “it is possible to taint the photo lineup by presenting a person who looks most like the suspect” but is not in fact the suspect. The Department’s policy, merely telling police that they should conduct “further investigation,” had not stopped police from engaging in this bad practice./p pBecause police have repeatedly proved unable or unwilling to follow face recognition searches with adequate independent investigation, police access to the technology must be strictly curtailed — and the best way to do this is through strong a href=https://www.aclu.org/sites/default/files/field_document/02.16.2021_coalition_letter_requesting_federal_moratorium_on_facial_recognition.pdfbans/a. More than 20 jurisdictions across the country, from Boston, to Pittsburgh, to San Francisco, have done just that, barring police from using this dangerous technology./p pBoilerplate warnings have proven ineffective. Whether these warnings fail because of human a href=https://www.nytimes.com/2020/06/09/technology/facial-recognition-software.htmlcognitive bias/a toward trusting computer outputs, poor police training, incentives to quickly close cases, implicit racism, lack of consequences, the fallibility of witness identifications, or other factors, we don’t know. But if the experience of known wrongful arrests teaches us anything, it is that such warnings are woefully inadequate to protect against abuse./p

The Cleveland Museum of Natural History Seeks New Ways to Engage Visitors

By: John Hanc
27 April 2024 at 05:02
The Cleveland Museum of Natural History is rolling out two new exhibition halls and making its scientists more accessible. And don’t forget the dinosaurs.

© Daniel Lozada for The New York Times

“Happy” (short for Haplocanthosaurus delfsi), a 70-foot-long, 14-foot-high sauropod, dominates the newly renovated main visitor hall at the Cleveland Museum of Natural History — and serves as the museum’s logo.

‘To the Future’: Saudi Arabia Spends Big to Become an A.I. Superpower

The oil-rich kingdom is plowing money into glitzy events, computing power and artificial intelligence research, putting it in the middle of an escalating U.S.-China struggle for technological influence.

© Iman Al-Dabbagh for The New York Times

More than 200,000 people converged on the Leap tech conference in the desert outside Riyadh in March.

‘To the Future’: Saudi Arabia Spends Big to Become an A.I. Superpower

The oil-rich kingdom is plowing money into glitzy events, computing power and artificial intelligence research, putting it in the middle of an escalating U.S.-China struggle for technological influence.

© Iman Al-Dabbagh for The New York Times

More than 200,000 people converged on the Leap tech conference in the desert outside Riyadh in March.

Generative A.I. Arrives in the Gene Editing World of CRISPR

By: Cade Metz
22 April 2024 at 16:48
Much as ChatGPT generates poetry, a new A.I. system devises blueprints for microscopic mechanisms that can edit your DNA.

© Profluent Bio

Structure of the first AI-generated and open-sourced gene editor, OpenCRISPR-1.

Generative A.I. Arrives in the Gene Editing World of CRISPR

By: Cade Metz
22 April 2024 at 16:48
Much as ChatGPT generates poetry, a new A.I. system devises blueprints for microscopic mechanisms that can edit your DNA.

© Profluent Bio

Structure of the first AI-generated and open-sourced gene editor, OpenCRISPR-1.

The Music Episode

“I feel like we’ve been at the club. I need some water and some electrolytes.”

© Photo Illustration by The New York Times; Image: Marcel ter Bekke, via Getty Images

National Academy Asks Court to Strip Sackler Name From Endowment

12 April 2024 at 11:10
Millions in Sackler donations sat dormant, rising in value as the opioid epidemic raged and as other institutions distanced themselves from the makers of a notorious painkiller.

© Shuran Huang for The New York Times

The National Academies of Sciences, Engineering and Medicine building in Washington, D.C.

Virtual Reality and the 'Virtual Wall'

10 April 2024 at 18:32

When EFF set out to map surveillance technology along the U.S.-Mexico border, we weren't exactly sure how to do it. We started with public records—procurement documents, environmental assessments, and the like—which allowed us to find the GPS coordinates of scores of towers. During a series of in-person trips, we were able to find even more. Yet virtual reality ended up being one of the key tools in not only discovering surveillance at the border, but also in educating people about Customs & Border Protection's so-called "virtual wall" through VR tours.

EFF Director of Investigations Dave Maass recently gave a lightning talk at University of Nevada, Reno's annual XR Meetup explaining how virtual reality, perhaps ironically, has allowed us to better understand the reality of border surveillance.

play
Privacy info. This embed will serve content from youtube.com

"Infrastructures of Control": Q&A with the Geographers Behind University of Arizona's Border Surveillance Photo Exhibition

5 April 2024 at 15:50

Guided by EFF's map of Customs & Border Protection surveillance towers, University of Arizona geographers Colter Thomas and Dugan Meyer have been methodologically traversing the U.S.-Mexico border and photographing the infrastructure that comprises the so-called "virtual wall."

An amrored vehicle next to a surveillance tower along the Rio Grande River

Anduril Sentry tower beside the Rio Grande River. Photo by Colter Thomas (CC BY-NC-ND 4.0)

From April 12-26, their outdoor exhibition "Infrastructures of Control" will be on display on the University of Arizona campus in Tucson, featuring more than 30 photographs of surveillance technology, a replica surveillance tower, and a blow up map based on EFF's data.

Locals can join the researchers and EFF staff for an opening night tour at 5pm on April 12, followed by an EFF Speakeasy/Meetup. There will also be a panel discussion at 5pm on April 19, moderated by journalist Yael Grauer, co-author of EFF's Street-Level Surveillance hub. It will feature a variety of experts on the border, including Isaac Esposto (No More Deaths), Dora Rodriguez (Salvavision), Pedro De Velasco (Kino Border Initiative), Todd Miller (The Border Chronicle), and Daniel Torres (Daniel Torres Reports).

In the meantime, we chatted with Colter and Dugan about what their project means to them.

MAASS: Tell us what you hope people will take away from this project?

MEYER: We think of our work as a way for us to contribute to a broader movement for border justice that has been alive and well in the U.S.-Mexico borderlands for decades. Using photography, mapping, and other forms of research, we are trying to make the constantly expanding infrastructure of U.S. border policing and surveillance more visible to public audiences everywhere. Our hope is that doing so will prompt more expansive and critical discussions about the extent to which these infrastructures are reshaping the social and environmental landscapes throughout this region and beyond.

THOMAS: The diversity of landscapes that make up the borderlands can make it hard to see how these parts fit together, but the common thread of surveillance is an ominous sign for the future and we hope that the work we make can encourage people from different places and experiences to find common cause for looking critically at these infrastructures and what they mean for the future of the borderlands.

A surveillance tower in a valley.

An Integrated Fixed Tower in Southern Arizona. Photo by Colter Thomas (CC BY-NC-ND 4.0)

MAASS: So much is written about border surveillance by researchers working off documents, without seeing these towers first hand. How did your real-world exploration affect your understanding of border technology?

THOMAS: Personally I’m left with more questions than answers when doing this fieldwork. We have driven along the border from the Gulf of Mexico to the Pacific, and it is surprising just how much variation there is within this broad system of U.S. border security. It can sometimes seem like there isn’t just one border at all, but instead a patchwork of infrastructural parts—technologies, architecture, policy, etc.—that only looks cohesive from a distance.

A surveillance tower on a hill

An Integrated Fixed Tower in Southern Arizona. Photo by Colter Thomas (CC BY-NC-ND 4.0)

MAASS: That makes me think of Trevor Paglen, an artist known for his work documenting surveillance programs. He often talks about the invisibility of surveillance technology. Is that also what you encountered?

MEYER: The scale and scope of U.S. border policing is dizzying, and much of how this system functions is hidden from view. But we think many viewers of this exhibition might be surprised—as we were when we started doing this work—just how much of this infrastructure is hidden in plain sight, integrated into daily life in communities of all kinds.

This is one of the classic characteristics of infrastructure: when it is working as intended, it often seems to recede into the background of life, taken for granted as though it always existed and couldn’t be otherwise. But these systems, from surveillance programs to the border itself, require tremendous amounts of labor and resources to function, and when you look closely, it is much easier to see the waste and brutality that are their real legacy. As Colter and I do this kind of looking, I often think about a line from the late David Graeber, who wrote that “the ultimate hidden truth of the world is that it is something that we make, and could just as easily make differently.”

THOMAS: Like Dugan said, infrastructure rarely draws direct attention. As artists and researchers, then, our challenge has been to find a way to disrupt this banality visually, to literally reframe the material landscapes of surveillance in ways that sort of pull this infrastructure back into focus. We aren’t trying to make this infrastructure beautiful, but we are trying to present it in a way that people will look at it more closely. I think this is also what makes Paglen’s work so powerful—it aims for something more than simply documenting or archiving a subject that has thus far escaped scrutiny. Like Paglen, we are trying to present our audiences with images that demand attention, and to contextualize those images in ways that open up opportunities and spaces for viewers to act collectively with their attention. For us, this means collaborating with a range of other people and organizations—like the EFF—to invite viewers into critical conversations that are already happening about what these technologies and infrastructures mean for ourselves and our neighbors, wherever they are coming from.

❌
❌