AI + social networks + unscrupulous actors

Charlie Stross’s talk at the 34th Chaos Communications Congress highlights risks associated with artificial intelligence technologies in combination with factors like geolocation, the engineering of content online to produce emotional responses, and people with malicious objectives from manipulating elections to harassing women seeking abortions.

It’s worth watching, and starting to think about what sort of regulatory and technological barriers might be erected to such abuse.

Modern board games

Here are a couple of interesting journalistic accounts of complex modern board games:

They both emphasize games that seek to accurately model military conflicts, particularly “A Distant Plain“, which is about the post-2001 intervention in Afghanistan.

A few years ago, I tried to convince the student government (Lionel Massey Fund, or LMF) at Massey College into buying a game called “Persian Incursion” which sought to model an Israeli attack against the Iranian nuclear weapons program. They rejected the proposal as too expensive and controversial. It would be interesting to try a game like this sometime, but no board game café where I have asked yet has carried them.

Pullman on authoritarianism and eroded democracy

Along with The Good Man Jesus and the Scoundrel Christ, Phillip Pullman’s essay “Malevolent voices that despise our freedoms” must be one of his most radical pieces of writing. It corresponds to his general concern about lack of oversight over powerful institutions and speaks out powerfully against the authoritarianism that can arise in parallel with public fear:

And the new laws whisper:

We do not want to hear you talking about truth

Truth is a friend of yours, not a friend of ours

We have a better friend called hearsay, who is a witness we can always rely on

We do not want to hear you talking about innocence

Innocent means guilty of things not yet done

We do not want to hear you talking about the right to silence

You need to be told what silence means: it means guilt

We do not want to hear you talking about justice

Justice is whatever we want to do to you

And nothing else

One early passage in his new novel La Belle Sauvage evokes a similar theme:

She tried to keep a steady pace. She had nothing to fear from the police, or from any other agency, except like every other citizen she had everything to fear. They could lock her up with no warrant and keep her there with no charge; the old act of habeus corpus had been set aside, with little protest from those in Parliament who were supposed to look after English liberty, and now one heard tales of secret arrests and imprisonment without trial, and there was no way of finding out whether the rumors were true. (p. 153–4)

Authors like Pullman and Margaret Atwood play a valuable societal role in drawing attention to such dangers: that fear will drive us to hand over control to unaccountable entities and that a drift toward dystopia is possible. Among all the dangers we face, we mustn’t forget the nightmares the state is capable of imposing.

Related:

Pros and cons of Google’s advanced protection

I see enormous appeal in Google’s new advanced protection system for accounts. It requires a physical token to access your account, adds further screening of attachments, and has a much tougher account recovery process for anybody who legitimately loses access to their own account. It augments the security provided by their two-factor smartphone app by reducing the risk of someone using an attack against your phone as a way to steal the second factor.

Two problems are keeping me from signing up right away. First, it requires that you buy a Bluetooth token as well as a USB token. I much prefer to avoid wireless communications if possible, and I don’t want a delicate device that needs regular battery charging to carry around. The two tokens together cost about $50, and as an extra pain the Bluetooth token seems to be a pair to order via Amazon in Canada. Second, it forces you to access your account through Google’s Chrome browser, which seems unnecessarily restrictive and monopolistic.

Responding to violence intelligently

The often-excellent NPR Planet Money podcast (which ran an earlier episode about “Freeway” Rick) had two notably engaging recent segments.

One included an interesting account of the data-analysis-decision-action cycle in intelligence work, specifically when deciding if an assailant is an enemy counterintelligence agent or drug-addled mugger.

The other discussed policy and incentive problems in the area of kidnapping and ransom, including Canada’s supposed policy of not paying ransoms and prohibiting families from doing so.

Each is well worth a listen.

Fourth rule of the internet

A somewhat obvious rule of internet security to add to the first three:

  1. Against a sophisticated attacker, nothing connected to the internet is secure.
  2. Everything is internet now.
  3. You should probably worry more about being attacked online by your own government than by any other organization.
  4. Sensitive data about you is largely on the computers of other people who care little about your security.

Equifax is getting lots of attention right now, but consider also Deloitte, Adobe, Stratfor, Blizzard, LinkedIn, DropBox, Ashley Madison, last.fm, Snapchat, Adult Friend Finder, Patreon, Forbes, Yahoo, and countless others.

As Bruce Schneier points out, the only plausible path to reduce such breaches is for governments to make them far more painful and costly for corporations.

Arming Saudi Arabia

I find the debate about Canadian arms companies selling weapons and vehicles to Saudi Arabia a little perplexing. The media coverage seems to turn on the question of whether the arms and equipment are being used to oppress the civilian population of Saudi Arabia. I find this perplexing because there seems to be ample evidence that oppression at home and abroad is the main business of the Saudi government, and that anybody selling them anything should expect it to be used that way.

On one hand, it’s appealing that moving to non-fossil fuel sources of energy could undermine countries like Saudi Arabia. On the other, it’s frightening to think what would happen to the region in a future where nobody wants or is willing to use their oil.

Palantir and data analysis

Writing in The Guardian, Jacques Peretti has compiled an interesting summary of the technological capabilities and government-to-business relationships of Palantir, a secretive technology company focused on identifying patterns within large data sets and making them accessible to people without specialized training.

With sensors getting cheaper all the time, the tricky part of ubiquitous surveillance isn’t collecting the data. It’s making it intelligible and applicable. These kinds of powerful data linkage and analysis tools also undermine common-sense expectations and procedures for the protection of privacy. No human being might be able to look at a set of large supposedly-anonymized databases and pick out individuals, but it’s increasingly within the scope of what can be routinely done with computers.

Grating coupler arrays as cameras

A recent Economist article describes a novel camera design with the promise to be far thinner than those that exist now, with some novel features:

Not only do Dr Hajimiri’s cameras have no moving parts, they also lack lenses and mirrors—in other words, they have no conventional optics. That does away with the focal depth required by today’s cameras, enabling the new devices to be flat.

To mimic the image-making role of the optics in conventional cameras, the OPA manipulates incoming light using electrons. Dr Hajimiri compares the technique to peering through a straw while moving the far end swiftly across what is in front of you and recording how much light is in each strawful. In the OPA this scanning effect is created by manipulating the light collected by the grating couplers electronically, using devices called photodiodes. These place varying densities of electrons into the amplified light’s path through the OPA, either slowing it down or speeding it up as it travels. That shifts the arrival times of the peaks and troughs of the lightwaves. This “phase shifting” results in constructive interference between waves arriving from the desired direction, which amplifies them. Light coming from other directions, by contrast, is cancelled through destructive interference. Change the pattern of electrons and you change the part of the image field the OPA is looking at. Scanning the entire field in this way takes about ten nanoseconds (billionths of a second).

To zoom in for a close-up, the device selects a specific part of the image and scans it more thoroughly. To zoom out for a fish-eye, it scans the entire optical field, including light from the edges of that field. To change from zoom to fish-eye takes nanoseconds.

Doubtless, such cameras will have some interesting applications. Unfortunately, that will certainly include further entrenching the surveillance state — increasingly using devices too small to see.