Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5

Pentagon seeks AI ethicist + Digital human + iPhones could have been hacked for years

#1
C C Offline
Pentagon seeks 'ethicist' to oversee military artificial intelligence
https://www.theguardian.com/us-news/2019...e-ethicist

EXCERPT:" Wanted: military “ethicist”. Skills: data crunching, machine learning, killer robots. Must have: cool head, moral compass and the will to say no to generals, scientists and even presidents. [...] The Pentagon is looking for the right person to help it navigate the morally murky waters of artificial intelligence (AI), billed as the battlefield of the 21st century. [...] focus comes amid fears that China has gained an early advantage in the global race to explore AI’s military potential, including ... autonomous weapons.

Much as the phrase “military intelligence” has been mocked in the past, some critics might find irony in the notion of the military that waged war in Vietnam, Cambodia and Iraq delving into ethical philosophy. Shanahan insisted that ethics will be at the heart of the US’s advances in AI, if not those of its rivals. “We are thinking deeply about the ethical, safe and lawful use of AI,” he said. “At its core, we are in a contest for the character of the international order in the digital age. Along with our allies and partners, we want to lead and ensure that that character reflects the values and interests of free and democratic societies. I do not see China or Russia placing the same kind of emphasis in these areas.” (MORE)



The digital human: the cyber version of humanity’s quest for immortality
https://theconversation.com/the-digital-...ity-108081

INTRO: Immortality has been a topic of discussion since the legend of the Holy Grail. Some people have gone as far as cryogenic freezing after death in the hope that one day science will have advanced enough to resurrect them. Others believe the route to immortality lies in the digital realm. The theory that humans can be digitised and live on within the digital confines of a computer-based existence has been the subject of debate. But until recently, no one had taken the idea much beyond research and discussion.

Last year, a consortium of unidentified individuals launched Virternity with the stated goal of a digital life for all. A world that would be owned not by any government but by the people. This digital world, Virternity said, would remove the physical constraints upon us and the planet and usher in a completely new plane of existence. Then, without any warning, Virternity disappeared... (MORE)



Apple iPhones could have been hacked for years – here’s what to do about it
https://theconversation.com/apple-iphone...-it-122860

EXCERPT: . . . High-profile attacks on these devices might dispel the myth that Apple devices are not susceptible to serious security breaches. [...] For many years, the Apple iPhone has been considered one of the most secure smart phones available. But despite this reputation, security issues that might affect millions of users came to light last week, when researchers at Google revealed they had discovered websites that can infect iPhones, iPads, and iPods with dangerous software. Simply visiting one of these websites is enough to infect your device with malicious software, allowing a high level of access to the device. Worryingly, it seems these vulnerabilities have been “in the wild” (that is, actively used by cyber-criminals) for around two years.

[...] It’s not all bad news though. After Google reported the issues to Apple earlier this year, the vulnerabilities were promptly patched with the latest release of iOS (12.4.1). Any user updating their device to the latest version of iOS should be protected against this attack. The easiest way to do it is to go to Settings > General > Software Update on your phone and then follow the prompts.

[...How malware gets a foothold...] As soon you open the web page, malicious software is installed on the device. This software has the potential to access location data and information stored by various apps (such as iMessage, WhatsApp, and Google Hangouts). ... The list of websites involved has not yet been made publicly available, so users have no means to protect themselves other than by updating their device’s operating system. But we do know the number of visitors to these sites are estimated in the thousands per week. (MORE - details)
Reply
#2
Zinjanthropos Offline
Somehow I've managed to accumulate over 250 apps in two years despite only actually downloading just two personally. Am downloading 12.4.1 on devices tonight.

Am I crazy to think I'm being listened to? A week ago playing golf I put my phone in a dash compartment on our golf cart. My buddy and I talked about buying a new driver. He mentioned a specific brand and type and ever since then I get ads for that partiular golfstick constantly. Are some of hackers just listening in, it's too coincidental in my books.
Reply
#3
C C Offline
(Sep 7, 2019 08:30 PM)Zinjanthropos Wrote: Somehow I've managed to accumulate over 250 apps in two years despite only actually downloading just two personally. Am downloading 12.4.1 on devices tonight.

Am I crazy to think I'm being listened to? A week ago playing golf I put my phone in a dash compartment on our golf cart. My buddy and I talked about buying a new driver. He mentioned a specific brand and type and ever since then I get ads for that partiular golfstick constantly. Are some of hackers just listening in, it's too coincidental in my books.


Seems like there is an option in some browsers' preferences (if not all) that one can click to deny websites access to the microphone, camera, and apps of a device without permission. But once malware is installed, it of course circumvents those protocols.

Home virtual assitants like Alexa have been hacked to record everything they hear. Potentially less obstacle to that with smarphones and their applicable operating system's overconfidence in its security.

Intelligence agencies of foreign governments are surely reaping a bounteous harvest. "Take a look at this, Ivan! We can not only hear the senator cheating on his wife with two transvestite sex workers, but we've got an intermittent video shot, too. Add him to the 'create a traitorous informant or saboteur via blackmail' list."
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Gathering digital dust: Countless recorded "new" songs & demos never publicly known C C 0 74 Mar 25, 2022 11:28 PM
Last Post: C C
  A digital replica of your brain + DeepMind trained an AI to control nuclear fusion C C 0 68 Feb 16, 2022 05:59 PM
Last Post: C C
  The genderless digital voice the world needs right now C C 3 169 Nov 29, 2021 10:19 PM
Last Post: Leigha
  Engineers create a programmable (digital) clothes fiber C C 0 104 Jun 3, 2021 09:47 PM
Last Post: C C
  Can a Quantum Computer be Hacked? Zinjanthropos 1 153 Dec 19, 2020 04:07 AM
Last Post: stryder
  Researchers call for regulation to stop digital image alteration in advertising C C 1 209 Jul 27, 2019 12:26 AM
Last Post: Syne
  Alexa, Siri, Cortana: Are you misogynistically abusing your digital assistant? C C 2 658 Aug 15, 2017 06:36 PM
Last Post: C C
  Digital native fallacy: Teachers still know better C C 0 755 Oct 21, 2014 03:07 AM
Last Post: C C



Users browsing this thread: 1 Guest(s)