Toggle light / dark theme

Nevertheless, to date, most of the wealth generated by advances in A.I. and robotics has been acquired by the executives of technology companies. It’s time for the benefits of the A.I. revolution to be broadly distributed through an expanded social safety net.

Unfortunately, members of Congress are taking the opposite path and have proposed cuts to a range of social programs. Several hundred thousand people arrived in Washington on Saturday to protest these cuts. During the demonstration, masked agitators threw rocks at the autonomous drones deployed for crowd control; in response, drones dispensed pepper spray on the protesters below, causing a stampede. More than 20 people were injured and treated at local hospitals; one protester died of his injuries on Monday. The police detained 35 people at the scene; 25 more arrests have been made since then, after authorities used facial recognition technology to identify protesters from surveillance video.

Punishing the poor who were harmed by economic disruptions has been a mistake repeated throughout American history. During the Industrial Revolution, machines displaced many artisans and agricultural workers. To deter these unemployed workers from seeking public relief, local governments set up poorhouses that required residents to perform hard labor. And between 1990 and 2020, the federal government — and some state governments — repeatedly cut social program spending even as middle-class jobs disappeared as a result of outsourcing and automation. Workers who didn’t have the skills to thrive in the knowledge economy were resigned to join the underclass of service workers.

Security researchers from Google’s Project Zero team recently uncovered pre-installed apps in Android devices that either allowed remote attackers to carry out remote code execution, could disable Google Play Protect in devices, or could collect information on users’ web activities.

At the Black Hat cybersecurity conference in Las Vegas, Maddie Stone, a security researcher on Project Zero and who previously served as Senior Reverse Engineer & Tech Lead on Android Security team, revealed that her team discovered three instances of Android malware being pre-installed in budget Android phones in the recent past.

One such pre-installed app was capable of turning off Google Play Protect, the default mobile security app in Android devices, thereby leaving devices vulnerable to all forms of cyber attacks or remote surveillance. The Project Zero team also found an app pre-installed on Android phones that gathered logs of users’ web activities.

He can hack your WhatsApp, find out where you are in 15 minutes and monitor your iPhone. But Tal Dilian says he’s one of the good guys. It’s badly-behaved governments who should be in trouble, not the $12 billion industry he’s come to represent.

A short drive south of Alice Springs, the second largest population center in Australia’s Northern Territory, there is a high-security compound, code-named “RAINFALL.” The remote base, in the heart of the country’s barren outback, is one of the most important covert surveillance sites in the eastern hemisphere.

Given that going viral on the Internet is often cyclical, it should come as no surprise that an app that made its debut in 2017 has once again surged in popularity. FaceApp applies various transformations to the image of any face, but the option that ages facial features has been especially popular. However, the fun has been accompanied by controversy; since biometric systems are replacing access passwords, is it wise to freely offer up our image and our personal data? The truth is that today the face is ceasing to be as non-transferable as it used to be, and in just a few years it could be more hackable than the password of a lifetime.

Our countenance is the most recognisable key to social relationships. We might have doubts when hearing a voice on the phone, but never when looking at the face of a familiar person. In the 1960s, a handful of pioneering researchers began training computers to recognise human faces, although it was not until the 1990s that this technology really began to take off. Facial recognition algorithms have improved to such an extent that since 1993 their error rate has been halved every two years. When it comes to recognising unfamiliar faces in laboratory experiments, today’s systems outperform human capabilities.

Nowadays these systems are among the most widespread applications of Artificial Intelligence (AI). Every day, our laptops, smartphones and tablets greet us by name as they recognise our facial features, but at the same time, the uses of this technology have set off alarm bells over invasion of privacy concerns. In China, the world leader in facial recognition systems, the introduction of this technology associated with surveillance cameras to identify even pedestrians has been viewed by the West as another step towards the Big Brother dystopia, the eye of the all-watching state, as George Orwell portrayed in 1984.

As well as Gait Recognition. (Go ahead and wear a disguise.)


The mass surveillance of innocent Americans continues as George Orwell’s 1984 becomes more of a reality with each passing day. “All told, we are barreling toward a future where every ritual of public life carries implicit consent to be surveilled,” writes Sidney Fussell for The Atlantic.

A new report from Georgetown Law‘s Center on Privacy & Technology (CPT) suggests that Immigration and Customs Enforcement (ICE) may be using the rampant problem of illegal immigration as a type of cover to track and spy on Americans in violation of their Fourth Amendment rights. Three years ago, the center revealed that nearly half of all U.S. adults are already in the FBI’s facial recognition database, which is largely sourced from DMV photos.

ICE has apparently requested special access to Department of Motor Vehicles (DMV) databases in at least three states – Utah, Washington State, and Vermont – which the federal agency plans to use in conjunction with facial recognition technology to scan people’s drivers’ license photos and match them against criminal and residency databases, all without their knowledge or consent.

How dictators work in the 21st century.


The new president of Kazakhstan is now proving that he will keep the old, oppressive systems alive for the 21st century, using advanced technical tools.

The man in the middle: Beginning last week, Kazakhstan’s government is intercepting all HTTPS traffic inside the country, ZDNet reports. HTTPS is a protocol meant to offer encryption, security, and privacy to users, but now the nation’s internet service providers are forcing all users to install certificates that enable pervasive interception and surveillance.

On Wednesday, Kazakh internet users were redirected to web pages instructing them to install the government’s root certificate in their web browser, which enables what’s called “man in the middle” interception of internet traffic, decryption, and surveillance.