Dozens of scientists, entrepreneurs and investors involved in the field of artificial intelligence, including Stephen Hawking and Elon Musk, have signed an open letter warning that greater focus is needed on its safety and social benefits.
The letter and an accompanying paper from the Future of Life Institute, which suggests research priorities for “robust and beneficial” artificial intelligence, come amid growing nervousness about the impact on jobs or even humanity’s long-term survival from machines whose intelligence and capabilities could exceed those of the people who created them.Read more
On human rights day Edward Snowden appeared by video link at an event organised by Amnesty International, le Monde, Mediaparte and Arte in Paris. The event, which was simultaneously translated, marks the first time Edward Snowden has spoken live to an audience in France.
Reacting to the release of the Senate Intelligence Committee’s report into CIA torture programmes, Edward Snowden told his audience that the things that we did as a result of this programme are inexcusable crimes. And what we see is quite dangerous in the United States debate.Read more
Serious concessions have been made about privacy post-Snowden, in particular about how personal information is processed and consumed online. Results from a survey show that the leaks have raised consumers’ consciousness about not only government, but commercial, collection of personal data.
Americans lack the confidence that they have any control over their personal data. The survey asked about six modes of communication: landlines; cell phones; text messaging; email; chat or IM; and social media. People, according to the results, are less worried about their physical location being disclosed, as well as the content of text messages, whom they’re texting or calling.Read more
To infiltrate foreign networks and gain access to sensitive systems, the NSA has been using the tactics of “physical subversion” – deploying undercover agents in Chinese, German, South Korean and possibly even American companies.
Past reports on the National Security Agency have typically depicted a government organ that hacks other systems or works with private corporations to bypass their own encryption protections, but the latest report based on files leaked by Edward Snowden suggests the agency could be embedding operatives into foreign, as well as domestic, “commercial entities.”Read more
According to Edward Snowden, people who care about their privacy should stay away from popular consumer Internet services like Dropbox, Facebook, and Google. Snowden conducted a remote interview today as part of the New Yorker Festival, where he was asked a couple of variants on the question of what we can do to protect our privacy.
His first answer called for a reform of government policies. Some people take the position that they “don’t have anything to hide,” but he argued that when you say that, “You’re inverting the model of responsibility for how rights work”.Read more
An elite team of US government hackers left Syria without internet, when they tried to hack one of the cores routers but instead crashed it, NSA whistleblower Edward Snowden said.
The three-day nationwide internet blackout in war-torn Syria in November 2012, which was blamed on either the government or the rebels, depending on who you listened to, was actually the doing of the Tailored Access Operations (TAO), a group of hackers in the employment of the US National Security Agency. And more more interesting.Read more
At a recent debate concerning the National Security Agency’s bulk surveillance programs, former CIA and NSA director Michael Hayden admitted that metadata is used as the basis for killing people.
The comments were made during a debate at Johns Hopkins University, after Georgetown University Law Center professor David Cole detailed the kind of information the government can obtain simply by collecting metadata – who you call, when you call them, how long the call lasts, and how often calls between the two parties are made. Although NSA supporters often claim such metadata collection is permissible considering the content of the call is not collected.Read more
The National Security Agency has built a surveillance system capable of recording “100 percent” of a foreign country’s telephone calls, enabling the agency to rewind and review conversations as long as a month after they take place, according to people with direct knowledge of the effort and documents supplied by former contractor Edward Snowden.
A senior manager for the program compares it to a time machine — one that can replay the voices from any call without requiring that a person be identified in advance for surveillance. On Jan. 17, President Obama called for significant changes to the way the NSA collects and uses telephone records of U.S. citizens.Read more
Representatives of Obama‘s Administration continue to insist that spying on Americans is not a violation of constitutional rights of citizens and carried out exclusively in the interests of national security.
However, Chris Kitts, the father of beforeitsnews.com, believes that the obtained information is used not only for security purposes.
According to Chris Kitts, Washington creates “The machine for the implementation blackmail. Now they have access to the emails of people who are in the data store in Utah.Read more
Ostensibly concerned that terrorists would disguise themselves as gamers in order to secretly communicate, agents from the NSA, CIA, Pentagon and Britain's GCHQ have posed undercover in online realms like World of Warcraft, Second Life, and Xbox Live. In fact, the practice grew so popular with the spy agencies that a special "deconfliction" group was established to prevent the agents from inadvertently spying on or trying to recruit each other.
Our country's best and brightest began disguising themselves as digital trolls, elves, and supermodels in 2008, after a top-secret NSA documents—provided by Edward Snowden described the games as a "target-rich communication network" that lets terrorists and other criminals "hide in plain sight."Read more