On The Wire

The Ethics of Voice Cloning

Digital cloning is a technology that uses deep learning algorithms to manipulate audio, photographs and videos making it difficult to distinguish what is fake from what is real. Although the technology has been used for beneficial educational purposes, such as synthesizing audio books without human readers, concerns continue to emerge ...
Continue Reading
/

Genetic Privacy and Genealogy Sites

Investigative genetic genealogy is a technique used by law enforcement to identify suspects in criminal investigations. It involves uploading a crime scene DNA profile to one or more genetic genealogy databases with the object of identifying a suspect's relatives and, eventually, locating the suspect in the family tree. The prospect ...
Continue Reading
/

Machine Learning and Mass Manipulation

What are the consequences when machine learning techniques are brought to bear on the individual? Not only is large scale manipulation possible, it can be achieved with relative ease. By manipulating what people are exposed to, content providers can achieve targeted influence on an individual's emotional state, political leanings and ...
Continue Reading
/

The Colonial Pipeline Cyberattack

On May 7, 2021, Colonial Pipeline Co. sustained a ransomware cyberattack disabling the computerized equipment that manages its pipeline. The pipeline carries gasoline, diesel and jet fuel from Texas to New York and services much of the eastern seaboard. It was the largest cyberattack on an oil infrastructure target in ...
Continue Reading
/

The Algorithms Shaping Our World

Machine learning is supplementing or replacing human decision making in virtually all sectors of society. Law, medicine, education, insurance, banking, advertising, communication, dating. The list goes on. Netflix Recommendation Engine filters content and makes recommendations for subscribers. Google Street View images have been used to estimate the demographic makeup of ...
Continue Reading
/

Cyberespionage and the New Hacktivism

Cyberespionage is the act of obtaining information from individuals, governments and private-sector entities without permission for political or military advantage. In the cyber universe espionage involves access to computers or networks for a strategic gain. It is distinct from cyber threats motivated by theft or fraud. A hacker is someone ...
Continue Reading
/

Machine Learning: Privacy in Processing

Machine learning is shaping our society. It is used virtually everywhere. Simply living modern life has created an explosion of data. Improvements in processing capabilities allow for unprecedented levels of analysis. Machine learning is a core component of artificial intelligence. Advanced algorithms are capable of gleaning insights and correlations between ...
Continue Reading
/

Apple’s New iOS to End Invisible Tracking

We are tracked. All day, every day. We are tracked so that data brokers can learn what we are susceptible to and refine how to profit from exploiting what they know about us. The nature of this tracking is about to change. In the coming weeks, Apple is expected to ...
Continue Reading
/

Privacy and Aerial Surveillance

Aerial surveillance includes monitoring by drones, unmanned aircraft and surveillance planes operated by human pilots. The concern about the privacy implications arising from the warrantless use of aircraft to take photographs and videos has increased over the last year with their deployment by municipal law enforcement agencies. The concern is ...
Continue Reading
/

Dancing With Killer Robots

Lethal autonomous weapons are a type of robot that can independently search out and engage targets without meaningful human control. They are also called lethal autonomous weapon systems (LAWS), lethal autonomous robots (LAR) and autonomous weapons systems (AWS). The international non-governmental organization, Human Rights Watch, has expressed "serious doubts" whether ...
Continue Reading
/