Law in the Internet Society

View   r2  >  r1  ...
RaulMazzarellaSecondEssay 2 - 07 Dec 2019 - Main.RaulMazzarella
Line: 1 to 1
 
META TOPICPARENT name="SecondEssay"
Changed:
<
<
>
>
 
Deleted:
<
<
It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
 
Changed:
<
<

Paper Title

>
>

Artificial intelligence and mass surveillance

-- By RaulMazzarella; December 6, 2019

The technological development of Artificial Intelligence

Mass surveillance for illegitimate reasons has been a widely discussed topic since Edward Snowden's first revelations in 2013. Now, this topic is becoming even more relevant for the use of a new technology that is making this practice even more powerful: artificial intelligence.

According to Professor Nils J. Nilsson, Artificial Intelligence (“AI”) is that activity devoted to making machines intelligent, and intelligence is that quality that enables an entity to function appropriately and with foresight in its environment. These intelligent machines, are nowadays, for example, helping run smartphones, internet search engines, digital voice assistants and Netflix movie queues. Additionally, these AI machines are now capable of reading video footage to search for specific things (like a specific type of car) from any CCTV system that is uploaded to the cloud, to detect the difference between a normal actor and someone acting out of bounds in a bank, or in general to identify people using facial recognition and 5G networks.

 
Deleted:
<
<
-- By RaulMazzarella - 05 Dec 2019
 
Added:
>
>

Its use in mass surveillance

 
Changed:
<
<

Section I

>
>
States are also using this technology for their own benefit and specifically for surveillance purposes, being China a great example. Some reports say that China uses this technology to collect massive amounts of data on how, where, and with whom ethnic groups spend their time and eventually they can feed these data into algorithms that allow them to predict, the everyday life of the population of this country. On the same note, China has set up the world’s most sophisticated surveillance state in Xinjiang province, tracking citizens’ daily movements and smartphones use. But China is not the only country that has been using AI, according to some studies, at least seventy-five countries globally are actively using AI technologies for surveillance purposes. This includes smart city/safe city platforms (fifty-six countries), facial recognition systems (sixty-four countries), and smart policing (fifty-two countries) and everything indicates that the spread of AI will keep growing.
 
Deleted:
<
<

Subsection A

 
Added:
>
>

The problems of AI

 
Deleted:
<
<

Subsub 1

 
Changed:
<
<

Subsection B

>
>
The possible issues of this kind of technology are almost unimaginable. AI facial recognition would practically end anonymity and privacy, and some experts have expressed concerns about error rates and increased false positives for minority people. On the same note, there are fears about algorithmic bias in AI training and their harmful influence on predictive policing algorithms and other analytic devices used by law enforcement, among other potential problems.
 
Added:
>
>
Additionally, AI can, for example, help autocratic governments to obtain and manipulate available truthful information to spread erroneous or false news. These tactics may be used to send personalized messages focused on (or against) specific persons or groups of people. However, the use of this technology raises some ethical questions in even the most democratic of countries, and some even believe that this could be a threat to democracy.
 
Changed:
<
<

Subsub 1

>
>
Just a few days ago, Edward Snowden was interviewed about this very topic, where he stated that “before 2013 (…) it was very expensive (…) and that created a natural constraint on how much surveillance was done. The rise of technology meant that, now, you could have individual officers who could now easily monitor teams of people and even populations of people, entire movements, across borders, across languages, across cultures, so cheaply that it would happen overnight.”
 
Deleted:
<
<

Subsub 2

 
Added:
>
>

Two possible countermeasures

 
Changed:
<
<

Section II

>
>

The political and academic proposal

 
Changed:
<
<

Subsection A

>
>
Relevant controls to the ability of the States to use this technology should be applied everywhere possible. The problem is not only that the States are watching its people, is how there are doing it and what they can achieve with that. According to Snowden “the invention of artificial general intelligence is opening Pandora’s Box and I believe that box will be opened. We can’t prevent it from being opened. But what we can do is, we can slow the process of unlocking that box (…) until the world is prepared to handle the evils that we know will be released into the world from that box.”
 
Changed:
<
<

Subsection B

>
>
I agree with this approach and I believe that it is the labor of policymakers to prevent that the use of this technology goes out of control, as it is starting to happen everywhere in the world, and it’s the role of the academia to warn the general public and the policymakers about the risks of the application of this kind of technology. It is also the role of the companies that develop this technology to use strict ethical codes to avoid the misuse of the same.
 
Added:
>
>

Self-education

 
Changed:
<
<

You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:
>
>
It is always a possibility that the combined efforts of policymakers, academia, and the companies are not enough or are not fast enough to stop or diminish the evils that come with this technology. For that reason, the general public should be educated about this issue and should try to adopt technological and practical countermeasures to this technology, whenever possible. I agree with professor Eben Moglen that some of these features should be to implement strong encryption everywhere possible, to prefer decentralized services, to choose free software modifiable by its users, to avoid the use of technological equipment that could be tracking you, and to use private servers systems such as freedom box. However, in my view, the main responsibility of the general public is to protest and let their governments know, that the right to privacy must not be surrendered in any case.
 
Changed:
<
<
>
>

Conclusion

 
Deleted:
<
<
Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.
 \ No newline at end of file
Added:
>
>
This paper discussed the development of AI and its potential use and misuse in relation to mass surveillance. This kind of technology is rapidly improving and growing across the globe, without any clear countermeasures to this date. For this reason, people have begun to worry about it and policymakers, academia, the companies that develop this technology and the general public should start doing something about it, before its too late. This is because, at the end of the day, it is a responsibility of the entire society to try to protect the human right to privacy, for all of us.

RaulMazzarellaSecondEssay 1 - 05 Dec 2019 - Main.RaulMazzarella
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="SecondEssay"

It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Paper Title

-- By RaulMazzarella - 05 Dec 2019

Section I

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

Section II

Subsection A

Subsection B


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.


Revision 2r2 - 07 Dec 2019 - 04:51:08 - RaulMazzarella
Revision 1r1 - 05 Dec 2019 - 22:04:09 - RaulMazzarella
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM