Gadgets News

Beating Books: How IBM’s research made US drones dangerous

If there is one thing the United States military has done well, it is killing. But even if the US military sees you, they may not know who you really are – so to speak, so-called “signature strikes” – even if God’s wrath is called to heaven.

As Kate Crawford, chief executive of Microsoft Research and co-founder of the AI ​​Now Institute at NYU, gives a brief overview of her new book, Atlas and AI, the military station is alive and well and is now reviewing illuminated metadata from IBM to select a house / tour / gender that reveals the party following the next show. And if you think that the same technology is not going to destroy your home economy, I have a selling price.

Yale University Press

Mentioned from Atlas of AI: Power, Politics, and the Planetary Cost of Artificial Intelligence written by Kate Crawford, published by Yale University Press. Copyright © 2021 by Yale University President and Youth. Use of permission. All rights reserved.


The starting point for the military that illuminates is the concept of signature. Towards the end of President George W. Bush’s second term, the CIA said it should launch drones according to a person’s “system” or “signature”.

Where “abstinence” involves pointing to another person, “signature” is when a person is executed for their metadata signing; in other words, it is not known but the data suggest that it could be a terrorist.

As Snowden’s posters pointed out, in Obama’s time, the National metals’ global metadata screening program would have created a SIM card or a suspect’s phone, and then US troops would conduct drone demonstrations to kill anyone with the device.

“We kill people based on metadata,” said General Michael Hayden, a former NSA and CIA official. The NSA’s Geo Cell was said to say something very beautiful: “We follow you, you love them.”

Ignoring signatures can be clearly and legitimate, signifying a true identity. But in 2014, law enforcement agency Reprieve published a report showing that a drone strike attempting to kill 41 people has resulted in the death toll of about 1,147 people. “Drone terrorists have been sold to Americans saying” that’s right. “But it’s just as accurate as the wisdom that feeds them,” says Jennifer Gibson, who leads the report.

But the signature form is not correct: it is related. Once a plan is found in the data and reaches a certain level, skepticism is sufficient to take action even in the absence of conclusive evidence. Such judgment by systemic discernment is found in many places – it is usually a score.

Consider the case of the Syrian refugee crisis in 2015. Millions were displaced by the ongoing civil war and plundering their enemies for protection in Europe. Refugees were risking their lives for the dolls and the loaded boats. On September 2, a three-year-old boy named Alan Kurdi drowned in the Mediterranean Sea, along with his five-year-old brother, when their boat capsized. A painting depicting his body being washed on a beach in Turkey has made headlines around the world as a powerful symbol of relief efforts: one picture represents the total danger. But some saw this as an increased risk. It was at this point that IBM was asked about a new project. Can the company use its machine learning software to obtain the signatures of refugees who can be linked to jihadism? In short, can IBM differentiate between terrorism and refugees?

Andrew Borene, IBM’s chief testing officer, outlined what makes the program deploy Defense One soldiers:

“Our global team, some of the people of Europe, are receiving comments that there are some problems that among the asylum seekers who were starving and depressed, there were fighting men from the boats who appeared to be in good health. Was it because complaining about ISIS and, if so, would such a response be helpful? “

From a distance from their offices, IBM’s forensic scientists found that the problem was one of the best solutions to video surveillance and surveillance. Putting aside the many changes that have taken place in the temporary refugee camps and the many ideas used to describe terrorism, IBM developed a “terrorist test” to try to combat ISIS fighters from their refugee camps. Investigators found a lot of unchanged information, from Twitter to a list of drowning in several boats hit the coast of Greece and Turkey. He also created alerts, updated on the types of metadata that border guards lose. Based on these variables, they had a number of imaginary risks: not a sign of guilt or innocence, he said, but a great “awareness” of the person, including old addresses, workplaces, and social networking. At the moment, Syrian refugees are unaware that their data is being processed to test the way they can be released as terrorists.

This is one of many things where the new system of government administration uses the bodies of refugees as a test. The concept of war and policing is now a financial problem: the credit unions have infiltrated many AI systems, affecting everything from credit crunch to border clearance. Hundreds of such platforms are being used around the world, from China to Venezuela to the United States, to benefit pre-planned systems and punish those who do not follow them.

“This new permanent government,” according to sociologists Marion Fourcade and Kieran Healy, benefits “the best” economists while exploiting the minority. Debt settlement has, in a very broad sense, been an area where military and commercial signatures have been signed.

All the products that Engadget selected were selected by our management team, independent of our parent company. Some of our articles include helpful links. If you purchase one of these links, we will be able to make a donation.


Source link

Related Articles

Leave a Reply

Back to top button