Mind Matters Natural and Artificial Intelligence News and Analysis

CategorySurveillance

automotive-engineer-use-virtual-reality-headset-for-virtual-electric-car-3d-model-design-analysis-and-improvement-3d-graphics-visualization-shows-fully-developed-vehicle-prototype-analysed-optimized-stockpack-adobe-stock
Automotive Engineer Use Virtual Reality Headset for Virtual Electric Car 3D Model Design Analysis and Improvement. 3D Graphics Visualization Shows Fully Developed Vehicle Prototype Analysed Optimized

Why Don’t Some Tech Moguls Like Web3, the New Internet?

Web3 is a decentralized, less controlled version of the internet, as George Gilder predicted in Life After Google

In this week’s podcast, “Web3: The next generation of the internet” (August 4, 2022), Walter Bradley Center director Robert J. Marks interviews graduate students Adam Goad and Austin Egbert, both in computer engineering at Baylor University, on the coming decentralization of the internet. With developments like the ones they discuss looming, Big Tech may be seeing a waistline trim. This is the Part I of the first of the three discussions. https://mindmatters.ai/wp-content/uploads/sites/2/2022/08/Mind-Matters-198-Adam-Goad-Austin-Egbert.mp3 A partial transcript and Additional Resources follow. Dr. Marks began by discussing all the services he gets from Google, confessing that he has not needed to go to a library in over two decades. But… Robert J. Marks: Now, is Google just being nice in giving me all…

business-finance-savings-money-wages-payroll-or-accounting-concept-calendar-with-pink-marker-circle-in-word-payday-for-remind-stockpack-adobe-stock
Business, finance, savings money, wages, payroll or accounting concept : Calendar with pink marker circle in word payday for remind

Can Your Social Media Posts Sink Your Credit Rating? Maybe…

With AI tools, your posts or the time of day you apply for a loan might matter. Is that fair to you? Did you even know?

University of Georgia law prof Lindsay Sain Jones and Virginia Tech law prof Janine Hiller offer what should be startling news: What does your SAT score mean for your ability to pay off a car loan? What does your Facebook feed say about your chances of landing a mortgage? And, what does your propensity for snacking on road trips mean for your credit score? The answers: More than you think. Traditional credit scoring is based on a person’s demonstrated ability to take on debt and pay it off. But with the dawn of larger data pools and access to more sophisticated modeling programs, lenders and credit agencies are taking more nonfinancial factors into rating creditworthiness, particularly those without an extensive…

search-stockpack-adobe-stock
Search.

Life Beyond Google Search: Try the Other Search Engines

Recently, DuckDuckGo was found to be tracking users sometimes, due to a deal with Microsoft. No matter, there are many search engines now…

Search engine DuckDuckGo — famous for not tracking users — lost some favor recently, after its CEO had to admit that it does sometimes track users: Security researcher Zack Edwards this week revealed that DuckDuckGo’s mobile browsers allow some Microsoft sites to bypass its block on trackers. While the browser blocks Facebook and Google trackers, DuckDuckGo makes an exception for some of Microsoft’s. Edwards found that the browsers allow allows data to be sent to Microsoft’s LinkedIn and Bing domains DuckDuckGo said the exemption was due to a search agreement with Microsoft. Thomas Macaulay, “DuckDuckGo faces widespread backlash over tracking deal with Microsoft” at The NextWebMay 26, 2022 DuckDuckGo’s CEO Gabriel Weinberg pointed out to disappointed users that the company…

Computer algorithm productivity efficiency, cyber security concepts

How China’s Pre-Crime Algorithms Work — and Their Fatal Flaw

The algorithms target, for example, those who complain about or draw attention to social injustices and abuses

In a previous article, we looked at the way George Orwell ’s dystopian 1984 is looking less and less like fiction as the Chinese Communist Party exploits the capabilities of AI and Big Data to surveil its entire population. But beyond surveilling citizens’ movements in real time, the CCP also hopes to predict crimes and protests before they happen. In a follow-up story in the New York Times, Paul Mozur, Muyi Xiao, and John Lui look at how the CCP is also bringing the dystopian world of Philip K. Dick ’s Minority Report (2002) to real life, with one difference: Rather than human “precogs” who can predict the future, the CCP relies on algorithms that can interrogate large swaths of…

double-exposure-of-business-woman-and-big-data-concept-digital-neural-networkintroduction-of-artificial-intelligence-cyberspace-of-futurescience-and-innovation-of-technologycity-background-stockpack-adobe-stock
Double exposure of business woman and Big Data concept. Digital neural network.Introduction of artificial intelligence. Cyberspace of future.Science and innovation of technology.city background.

Google’s Most Ambitious Project to Date: Reshaping Your Thinking

Controlling so much communication — and fired up by ideology — it’s in a better position for that than many suppose

In a column yesterday at Spiked, urban studies specialist Joel Kotkin, author of The Coming of Neo-Feudalism: A Warning to the Global Middle Class (2020), provided depressing evidence that the power of Big Tech is beginning to genuinely resemble the power medieval lords had over their serfs. It’s not just an office joke any more. Google, he recounts, was part of an anti-authoritarian high tech culture when it went public in 2004. Its search engine technology, and others, were seen as empowering the little guy. In 2018, for unclear reasons, Google dropped the famous “Don’t be evil” slogan. Since then, in Kotkin’s view, it is “increasingly becoming a force not for good, but for, well, evil.” He musters an impressive…

cyborg-hologram-watching-a-subway-interior-3d-rendering-stockpack-adobe-stock
Cyborg hologram watching a subway interior 3D rendering

Big Brother Is Watching You (And Trying to Read Your Mind)

Chinese researchers now claim to have developed technology that can read our minds

One of the most popular story lines in the widely acclaimed television show The Good Wife (2009–2016) is when National Security Agency (NSA) techies entertain themselves by eavesdropping on the heroine’s personal life. It clearly resonated with viewers and reinforced the fears of many that the NSA might be listening to their conversations. Indeed, they might be. In 2013 James Clapper, Director of National Intelligence, was asked by U.S. Senator Ron Wyden about whether NSA collects “any type of data at all on millions or hundreds of millions of Americans.” Clapper answered, under oath, “No sir, not wittingly.” Clapper had been informed the day before that he would be asked this question and he was offered an opportunity the day…

hacking-and-malware-concept-stockpack-adobe-stock
Hacking and malware concept

Largest Data Grab Ever Stole Shanghai’s Mass State Surveillance

The police, dutiful in monitoring everyone, flunked data security. Now it’s all for sale on the Dark Web

Beijing wants to create a centralized database with personal information on everyone living in China. To do that, the government saves massive amounts of data acquired through surveillance technologies such facial and voice recognition and cell phone monitoring. In a previous article, we saw that the Chinese government’s surveillance network is much more extensive than once thought. However, while the Chinese government has prioritized collecting massive amounts of data, it has not prioritized protecting it. Thus, a hacker has acquired police data files on 1 billion Chinese residents (approximately 23 terabytes of data) from the Shanghai National Police database. The files include name, national ID number, cell phone number, birthdate, birthplace, ethnicity, education level, marital status, and delivery records. They…

Tiananmen Square surveillance
Surveillance cameras at Tiananmen square in Beijing, China

China Is Quite Serious About Total Surveillance of Every Citizen

Local governments are buying enough surveillance equipment to constantly watch 1.6 billion people, documents show

The telescreen received and transmitted simultaneously… There was of course no way of knowing whether you were being watched at any given moment… It was even conceivable that they watched everybody all the time. But at any rate they could plug in your wire whenever they wanted to. You had to live — did live, from habit that became instinct — in the assumption that every sound you made was overheard, and, except in darkness, every movement scrutinised. – George Orwell, 1984 The New York Times in partnership with ChinaFile has come out with a new report on the extent of China’s surveillance state. It is nothing short of an attempt to achieve total surveillance of its 1.4 billion people:…

new-strong-password-and-weak-ones-near-keyboard-stockpack-adobe-stock
New strong password and weak ones near keyboard.

Forget Your Password? Apple Wants To End Them for Good But…

Do you want to give Apple your face- and fingerprints, maybe other “biometrics” down the road…?

We’ve all heard the tales of woe about people whose password was “password” or “123456” or “BertJones”. Currently, Big Tech, tired of the flak and the fallout, is trying to end passwords. Here’s Apple’s approach: When Apple’s latest software updates for iPhones, iPads and Macs arrive this fall, they will include a way for users to log into various online accounts without entering passwords or relying on password managers to save and fill in credentials. The technology generates unique passkeys for each app or browser-based service in the place of characters. Those passkeys, a new type of identity authentication, prompt a scan of your face or fingerprints to log you in… Passkeys, like those from Apple, are made up of…

a-moody-science-fiction-concept-of-a-figure-standing-in-a-field-with-ufo-lights-glowing-in-the-sky-on-a-foggy-spooky-night-with-a-vintage-grunge-edit-stockpack-adobe-stock
A moody science fiction concept, of a figure standing in a field with UFO lights glowing in the sky. On a foggy spooky night. With a vintage, grunge edit

NASA Cuts Out the Yuk Yuks, Gets Serious About UFO Research

This fall the space agency is hiring top scientists to tackle “some of the most perplexing mysteries”

A leading science news release site tells us that NASA is officially joining the hunt for UFOs. The nine-month project, which will see leading scientists examine the most puzzling images, is expected to begin in the fall and last nine months: “Over the decades, NASA has answered the call to tackle some of the most perplexing mysteries we know of, and this is no different,” Daniel Evans, the NASA scientist responsible for coordinating the study, told reporters on a call. News, “NASA gets serious about UFOs” at Phys.Org (June 9, 2022) Phys.org comments, “The announcement comes as the field of UFO study, once a poorly-regarded research backwater, is gaining more mainstream traction,” adding “Another overarching goal of NASA is to…

chinese-hacker-laptop-with-binary-computer-code-and-china-flag-on-the-screen-internet-and-network-security-stockpack-adobe-stock
Chinese hacker. Laptop with binary computer code and china flag on the screen. Internet and network security.

The Internet Is Freedom? Not for Exiled Democracy Activists

Modern electronic communications ensure that persecution need not stop at the border, as many expat Chinese are discovering

Earlier this month, the U.S. Department of Justice announced that a U.S. citizen and four Chinese intelligence officers “had been charged with spying on “prominent dissidents, human rights leaders and pro-democracy activists” in the United States on behalf of the People’s Republic of China (PRC). Americans and others who live in open societies may not be aware of this transnational oppression problem if they do not have contacts who have escaped totalitarian regimes. Briefly, today, the persecution doesn’t stop at the border. Modern electronic communications are part of the reason why not: “If anyone doubts how serious the Chinese government is about silencing its critics, this case should eliminate any uncertainty,” said Acting Executive Assistant Director Alan E. Kohler Jr.…

strichcode-stockpack-adobe-stock
Strichcode

What You Need To Know About Surveillance Capitalism

A Harvard professor coined the term and her 2019 book sounds a warning about how Google and Facebook gain power and wealth selling YOU

The term “surveillance capitalism” was coined by Harvard professor Shoshana Zuboff in her book The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. It’s a fascinating read, offering insight into the power that companies like Google and Facebook have amassed and the danger that power poses to our way of life. Here’s how she explained it to the United Kingdom’s Channel 4 News in 2019: Here’s how surveillance capitalism works, just in brief. It begins with these companies claiming, unilaterally claiming, our private human experience as their free source of raw material. So what do they do with that raw material? They lift out of it the rich predictive signals in our…

bottom-view-close-up-of-four-white-surveillance-cameras-stockpack-adobe-stock
Bottom view close-up of four white surveillance cameras

People Don’t Need a “Reason” to Want Privacy

We naturally don’t want either government or Big Tech following us around

In 2014, award-winning journalist Glenn Greenwald presented a compelling case for privacy at a TED Conference, dismantling the idea that “only people who are doing something wrong have a reason to hide.” Why did Greenwald feel that message was important? Two years earlier, in 2012, American intelligence contractor Edward Snowmen reached out to Greenwald, offering top secret National Security Agencvy (NSA) documents that its secret mass surveillance network. In 2013, Greenwald’s stories at The Guardian sparked an international conversation on national security versus privacy. The opening sentence of his first article reads, “The National Security Agency is currently collecting the telephone records of millions of US customers of Verizon, one of America’s largest telecoms providers, under a top secret order…

disappointed-faces

Facial Recognition Technology Can Now Detect “Facecrime”

Some claim it will help teachers interact with students better

At one time, this was science fiction: In George Orwell’s dystopian classic, 1984, citizens are monitored 24/7 through the use of “telescreens” that are stationed in every home and throughout every workplace, monitoring for facecrime. It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen. The smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself – anything that carried with it the suggestion of abnormality, of having something to hide. In any case, to wear an improper expression on your face (to look incredulous when a victory was announced, for example) was itself a punishable offense. 1984.…

shopping online at home concept.Cartons in a shopping cart on a laptop keyboard

Government Control of What You Buy Grows More Popular

With governments, that is. You’d be surprised at how far along they are with digital currency and how detailed the control could be

Recently, we looked at a new idea governments are looking at — programmable digital currency. It’s all digital, issued by government, constantly trackable, and can’t be spent on items not approved by government (or only with penalties). The Federal Reserve Board (the United States’ central bank) explains, bureaucratically, Potential benefits of the “digital cash” model using programmable UTXOs are the ability to specify spending constraints on any discrete amount of value and a greater facility to trace the provenance of any particular “virtual banknote.” Alexander Lee, “What is programmable money?” at FEDS Notes (June 23, 2021) In other words, the two benefits of these central bank digital currencies (CBDCs) are that the government can potentially control what the money is…

personal-social-credit-score-machine-learning-analytics-identify-person-technologyartificial-intelligence-no-privacy-security-camera-technology-concept-software-ui-analytics-and-recognition-people-stockpack-adobe-stock
Personal social credit score. Machine Learning analytics identify person technology,Artificial intelligence no privacy security camera technology concept. Software ui analytics and recognition people.

Is an AI-Driven Social Control System Emerging in America?

The gradual merger of Big Tech and Big Government is worthy of close analysis

Readers may assume that a “social credit system” where government monitors a citizen’s every move and assigns a score or takes action, could only happen in China. But increasingly, governments can monitor a citizen’s every move in North America too. Technology policy analyst Kara Fredericks explains: As Canada demonstrated, Western governments and tech companies are mobilizing to cut off mainstream citizens from public life and constrain their private lives. Actions like protesting government overreach, expressing “anti-authority” ideologies, or even sharing “disinformation” on social media may now be classified as terrorism… In the United States, the increasingly oppressive collaboration between public and private entities is not enforced at the barrel of a gun. It arises from an ideological symbiosis between tech…

female-scans-face-using-facial-recognition-system-on-smartphone-for-biometric-identification-future-digital-high-tech-technology-and-face-id-stockpack-adobe-stock
Female scans face using facial recognition system on smartphone for biometric identification. Future digital high tech technology and face id

IRS Backs Off on Facial Recognition Demand

Starting this summer, the IRS would have required all online users to submit a facial recognition scan. Now, they've changed their mind

The IRS is abandoning a new security program that would have required all online users to submit facial recognition scans in order to access its online services. Last November, the IRS announced that in summer 2022, it would begin requiring all online patrons to verify their accounts via facial recognition. The program was to be operated by ID.me, a private, third-party partner of the IRS. ID.me also contracts with a select few other federal entities, as well as 27 U.S. states. Facial recognition technology is a controversial new form of security. It’s been widely embraced by the Chinese Communist Party in its effort to maintain social control over a large population, and it has begun to creep into some jurisdictions in Western…

Bunch of old used outdated mobile phones and batteries. Recycling electronics

Surveillance and Silence at the 2022 Beijing Winter Olympics

Why are countries instructing their Olympic athletes to use burner phones?

In a previous article, I looked at the security issues with the MY2022 app, the official app for the 2022 Beijing Olympic Games, and the app that everyone who attends must download. The app has two key vulnerabilities that leave user data exposed when sending information over WiFi.* Aside from these vulnerabilities, the University of Toronto-based Citizen Lab found a list of censored keywords in the app’s code, as well as the capability to report someone who has sent politically contentious content over the messaging service. The keyword feature does not seem to be active, but as Jeffrey Knockel, author of the Citizen Lab report, told the New York Times, they could censor content with “the flip of a switch.” This is one…

chinese-flag-and-big-brother-data-surveillance-stockpack-adobe-stock
Chinese flag and big brother data surveillance

On What Terms Is Co-Operation Between the US and China Possible?

China analyst Miles Maochun Yu thinks that China’s new goal is to become the new global power first, then implement its ideology

A panel at COSM 2021 aired a disagreement between philosopher of technology George Gilder and political analyst Newt Gingrich. Gingrich argued that China is the greatest threat to global freedom while Gilder felt that claims about forced labor, for example, are overstated and that we must co-operate with China for technological advances. In the background is China’s 24/7 surveillance of the entire population, the door-to-door identification of and crackdown on religious believers, as well as on civil rights activists. The situation in China has changed a great deal over the past half decade which marked the Uyghur internment camps and the premature takeover of Hong Kong. As Michael Schuman puts it: China today is in the grip of the most…

water waves
Beautiful water waves -  Splashed water wave in clean blue water, clean filtered water ready for drinking

Why AI Can’t Really Filter Out “Hate News”

As Robert J. Marks explains, the No Free Lunch theorem establishes that computer programs without bias are like ice cubes without cold

In Define information before you talk about it, neurosurgeon Michael Egnor interviewed engineering prof Robert J. Marks on the way information, not matter, shapes our world (October 28, 2021). In the first portion, Egnor and Marks discussed questions like: Why do two identical snowflakes seem more meaningful than one snowflake. Then they turned to the relationship between information and creativity. Is creativity a function of more information? Or is there more to it? And human intervention make any difference? Does Mount Rushmore have no more information than Mount Fuji? Does human intervention make a measurable difference? That’s specified complexity. Putting the idea of specified complexity to work, how do we measure meaningful information? How do we know Lincoln contained more…