Technology

Error message

  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in _menu_load_objects() (line 579 of /var/www/drupal-7.x/includes/menu.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Notice: Trying to access array offset on value of type int in element_children() (line 6600 of /var/www/drupal-7.x/includes/common.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /var/www/drupal-7.x/includes/common.inc).

Exclusive: Streeting uses NHS privatisation announcement to tout IDF-linked health firm

Health privatisation enthusiast ‘Labour’ health spokesman namechecks Israeli military-linked firm as glowing example of private involvement in NHS – and visited firm in Israel on LFI-paid junket

Image by ‘The Agitator

As the death toll of Israel’s genocide in Gaza climbed above 30,000 this week according to observers EuroMed Monitor, Wes Streeting used an Israeli private health data company as his shining example of successful ‘entrepreneurialism’ – ie privatisation – in the NHS as ‘a source close to Mr Streeting’ briefed the media about his plans to ‘throw open the doors’ of the NHS to more private corporate provision if Labour gets into government.

The ‘source’ told the i:

Labour will encourage the spread of new technologies so private sector “innovators” have a clearer route to get their product into the NHS…

The best example on the tech side of ‘opening the door to entrepreneurs’ is where you’ve got a company or innovator of a product which works really well on the NHS. There’s an example of some at home kidney tests made by Healthy.io which were first sold into the NHS in 2021

But the link – and the Labour trolling of those outraged by the Gaza slaughter – goes much further. Healthy.io is owned and run by Yonatan Adiri, former Chief Technology Officer for the whole of Israel and an adviser to then-Israeli PM Shimon Peres. Adiri’s interests are not limited to private healthcare tech. His published works include Terror in the Court: Counter-Terrorism and Judicial Power in the Israeli Case Study and Counter Terror Warfare: The Judicial Front (2008), written for the International Institute for Counter-Terrorism (2005).

Adiri’s interest in ‘counter-terror’ did not end in 2008. Just two months ago, shortly after the Hamas kibbutz raid, Adiri spoke to Bloomberg Technology ‘The importance of Intelligence in Israel-Hamas war’, comparing Hamas to ISIS and talking of the use of technology by intelligence services to defeat the Palestinian resistance organisation:

Skwawkbox did not find details of any involvement with Israeli spytech unit ‘Unite 8200’ – the cyberspy unit whose members reportedly paint an ‘X’ on their headsets for each Palestinian they help kill – in Adiri’s IDF service, but according to his bio page as a speaker for hire on allamericanspeakers.com, he remains a reserve captain in the ‘international operational negotiations unit’ and has acted as moderator at discussions held by the Israeli-government-sponsored Institute for National Security Studies on the use of drones and other technology for ‘national security’:

According to one article, Adiri acted for the IDF in negotiating a prisoner swap with Lebanese militia group Hezbollah.

Adiri also acted as senior national security ‘policy consultant’ for the Reut Institute, a right-wing Israeli think tank that now plays a key role in Israel’s attempts to counter the peaceful pro-Palestinian ‘Boycott, Divestment and Sanctions’ movement.

And while Adiri may not have been a member of Unit 8200, he is – since at least March 2023 – an ‘industry mentor’ for the ‘LEAP’ initiative:

The LEAP website says that:

Leap was created in partnership with 8200bio, an organization of 8200 alumni working to promote the Israeli healthtech ecosystem. The program does strive to bring exceptional 8200 alumni into the healthtech domain, but the program is open to entrepreneurs of any background, according to the criteria described above.

Like its partner 8200 Impact, 8200bio is run by former members of what 8200 Impact calls the ‘elite IDF Signal Intelligence and Cybersecurity unit’. Israeli newspaper Haaretz noted in 2020 that:

Nor did Wes Streeting simply pull the name Healthy.io out of a hat without knowing the company’s links. In May 2022, according to right-wing pressure group Labour Friends of Israel (LFI), Streeting visited Israel on LFI’s dime – and LFI said ahead of the trip that:

Streeting will also visit Healthy.io, a tech provider for the NHS and Boots.

Right-wing libel-merchant and ‘dauphin of phone hacking‘ Lee Harpin, writing for Jewish News rather than the Jewish Chronicle that he cost so much money in damages for smearing left-wingers, confirmed that the visit went ahead. Streeting told the NHS Confederation last spring that he had been ‘blown away’ by his trip.

Keir Starmer employs a Unit 8200 alumnus, Assaf Kaplan, to monitor members’ social media.

Wes Streeting has come out as an avid NHS privatiser – which will surprise no one who has been watching. That he chose to garnish his promise to ‘throw open the doors’ of the NHS to more private profit-taking by touting an Israeli – and Israeli military-linked – firm during Israel’s war crimes, mass slaughter of women, children, medics and teachers and the bombing of hospitals and schools, in Gaza makes the betrayal even worse.

If you wish to republish this post for non-commercial use, you are welcome to do so – see here for more.

More than a Glitch: Confronting Race, Gender, and Ability Bias in Tech – review

Published by Anonymous (not verified) on Thu, 28/12/2023 - 9:00pm in

In More than a Glitch: Confronting Race, Gender, and Ability Bias in Tech, Meredith Broussard scrutinises bias encoded into a range of technologies and argues that their eradication should be prioritised as governments develop AI regulation policy. Broussard’s rigorous analysis spotlights the far-reaching impacts of invisible biases on citizens globally and offers practical policy measures to tackle the problem, writes Fabian Lütz.

More than a Glitch: Confronting Race, Gender, and Ability Bias in Tech. Meredith Broussard. MIT Press. 2023. 

Find this book: amazon-logo

More than a glitch-coverAs the world witnesses advancements in the use of Artificial Intelligence (AI) and new technologies, governments around the world such as the UK and US the EU and international organisations are slowly starting to propose concrete measures, regulation and AI bodies to mitigate any potential negative effects of AI on humans. Against this background, More than a Glitch offers a timely and relevant contribution to the current AI regulatory debate. It provides a balanced look at biases and discriminatory outcomes of technologies, focusing on race, gender and ability bias, topics that tend to receive less attention in public policy discussions. The author’s academic and computer sciences background as well as her previous book Artificial Unintelligence – How Computers Misunderstand the World make her an ideal author to delve into this important societal topic. The book addresses algorithmic biases and algorithmic discrimination which not only receives increasing attention in academic circles but is of practical relevance due to its potential impacts on citizens and considering the choice of regulation in the coming months and years.

[More than a Glitch] provides a balanced look at biases and discriminatory outcomes of technologies, focusing on race, gender and ability bias, topics that tend to receive less attention in public policy discussions

The book’s cornerstone is that technology is not neutral, and therefore racism, sexism and ableism are not mere glitches, but are coded into AI systems.

Broussard argues that “social fairness and mathematical fairness are different. Computers can only calculate mathematical fairness” (2). This paves the way to understand that biases and discriminatory potential are encoded in algorithmic systems, notably by those who have the power to define the models, write the underlying code and decide which datasets to use. She argues that rather than just making technology companies more inclusive, the exclusion of some demographics in the conceptualisation and design of frameworks needs to stop. The main themes of the book, which spans eleven short chapters, are machine bias, facial recognition, fairness and justice systems, student grading by algorithms, ability bias, gender, racism, medical algorithms, the creation of public interest technology and options to “reboot” the system and society.

Biases and discriminatory potential are encoded in algorithmic systems, notably by those who have the power to define the models, write the underlying code and decide which datasets to use.

Two chapters stand out in Broussard’s attempt to make sense of the problems at hand: Chapter Two, “Understanding Machine Bias” and more specifically Chapter Seven “Gender Rights and Databases”. Both illustrate the author’s compelling storytelling skills and her ability to explain complex problems and decipher the key issues surrounding biases and discrimination.

Chapter Two describes one of the major applications of AI: machine learning which Broussard defines as to take

“..a bunch of historical data and instruct a computer to make a model. The model is a mathematical construct that allows us to predict patterns in the data based on what already exists. Because the model describes the mathematical patterns in the data, patterns that humans can’t easily see, you can use that model to predict or recommend something similar” (12).

The author distinguishes between different forms of training a model and discusses the so called “black box problem” – the fact that AI systems are very often opaque – and explainability of machine decisions. Starting from discriminatory treatment of bank loan applications, for example credit score assessment on the basis of length of employment, income or debt, the author explains with illustrative graphs how algorithms find correlations in datasets which could lead to certain discriminatory outcomes. She explains that contrary to humans, machines have the capacity to analyse huge amounts of datasets with data points which enable for example banks to make predictions on the probability of loan repayment. The mathematics underlying such predictions are based on what similar groups of people with similar variables have done in the past. The complex process often hides underlying biases and potential for discriminations. As Broussard points out,

“Black applicants are turned away more frequently than white applicants [and] are offered mortgages at higher rates than white counterparts with the same data […]” (25).

The book also demonstrates convincingly that the owners or designers of the model wield a powerful tool to shape decisions for society. Broussard sums up the chapter and provides crucial advice for AI developers when she states, advice for AI developers when she states,

“If training data is produced out of a system of inequality, don’t use it to build models that make important social decisions unless you ensure the model doesn’t perpetuate inequality” (28).

Chapter Seven looks at how databases impact gender rights, starting with the example of gender transition which is registered in Official Registers. This example illustrates the limitations of algorithmic systems as compared to humans, not only in light of the traditional binary system for assigning gender as male and female, but more generally the binary system that lies at the heart of computing. Both in the gender binary and computer binary framework, choices need to be made between one or the other leaving no flexibility. Broussard describes the binary system as follows:

“Computers are powered by electricity, and the way they work is that there is a transistor, a kind of gate, through which electricity flows. If the gate is closed, electricity flows through, and that is represented by a 1. If the gate is open, there is no electricity, and that is represented by a 0” (107).

When programmers design an algorithm, they “superimpose human social values onto a mathematical system.” Broussard urges us to ask ourselves, “Whose values are encoded in the system?” (109).

The resulting choices that need to be made within AI systems or forms used in administration often do not adequately represent reality. For people who do not feel represented by the options of male and female, such as gender non-conforming people, they are asked to make the choice in which category they fall even though this would not reflect their gender identity. Here again, Broussard reminds us of the importance of design choices and assumptions of coders which impact people’s everyday life. When programmers design an algorithm, they “superimpose human social values onto a mathematical system.” Broussard urges us to ask ourselves, “Whose values are encoded in the system?” (109). The chapter concludes with the challenge of making “technological systems more inclusive” (116) and argues that computers constitute not only mathematical but sociotechnical systems that need to be updated regularly in order to reflect societal change.

Computers constitute not only mathematical but sociotechnical systems that need to be updated regularly in order to reflect societal change.

The book successfully describes the invisible dangers and impacts of these rapidly advancing technologies in terms of race, gender and ability bias, making these ideas accessible through concrete examples. Ability bias is discussed in Chapter Seven, “Ability and Technology”, where she gives several examples, how technology companies try to provide technology to serve the disabled community in their daily jobs or lives. She gives the example of Apple shops where either sign language interpreters are available or where Apple equips employees with an iPad to communicate with customers. For consumers, she also highlights Voiceover screen reader software, auto-captioning and transcripts of audio or read-aloud functions of newspaper sites. Broussard points both to the advantages and the limitations of those technological solutions.

She also introduces the idea of tackling biases and discrimination with the help of audit systems

Readers are invited to reflect on concrete policy proposals and suggestions, on the basis of some ideas sketched out in last chapter, “Potential Reboot” where she shows her enthusiasm for the EU’s proposed AI Act and the US Algorithmic Accountability Act. She also introduces the idea of tackling biases and discrimination with the help of audit systems and presents a project for one such system based on the regulatory sandbox idea, which is a “safe space for testing algorithms or policies before unleashing them on the world” (175). The reader might wish that Broussard‘s knowledge of technology and awareness of discrimination issues could have informed the ongoing policy debate even further.

In sum, the book will be of interest and use to a wide range of readers, from students, specialised academics, policy makers and AI experts to those new to the field who want to learn more about the impacts of AI on society.

This post gives the views of the author, and not the position of the LSE Review of Books blog, or of the London School of Economics and Political Science. The LSE RB blog may receive a small commission if you choose to make a purchase through the above Amazon affiliate link. This is entirely independent of the coverage of the book on LSE Review of Books.

Image Credit: Vintage Tone on Shutterstock.

Space Junk

Published by Anonymous (not verified) on Thu, 28/12/2023 - 12:59am in

Microsoft is trying to build the biggest video games in the business—but are they any good?

Harvard Endowment Investor and Other Business Leaders Take a Solidarity Trip to Israel

Published by Anonymous (not verified) on Wed, 20/12/2023 - 8:16am in

Dozens of prominent investors and business leaders traveled to Israel this week to show solidarity with Israel amid its war on Hamas, according to documents from the junket obtained by The Intercept.

The trip included top officials from private equity firms like Bain Capital; leaders from the tech industry, like a Patreon executive; and a managing director at the endowment investment firm of Harvard University, a school riven by political clashes around the Israeli war on Gaza.

“In every war there are multiple fronts. The attendees of this mission are here to help counter the war’s economic disruption.”

The documents, which include an itinerary and list of attendees, provide details about the weeklong meeting taking place in Tel Aviv and Jerusalem, called the Israel Tech Mission. Beginning on Sunday, the meeting includes panels like “Tech in the Trenches: Supporting an ecosystem during wartime.”

Participants will hold meetings with top Israeli officials, like President Isaac Herzog, along with opposition leader and former military chief of staff Benny Gantz, who joined Israeli Prime Minister Benjamin Netanyahu’s war cabinet after the October 7 attack.

Shoring up investor confidence would be welcome news in Israel. The Israeli stock exchange — whose chair Tech Mission participants are slated to meet with on Thursday — suffered billions in losses after the Hamas attack on October 7, though it has gradually recovered. The market losses came in the wake of the reported withdrawal from Israel of some foreign investors when the country was roiled by Netanyahu’s controversial attempt to roll back judicial independence.

The Israel Tech Mission is explicit in its support for the Israeli war effort.

“In every war there are multiple fronts,” Ron Miasnik, a co-organizer of the Israel Tech Mission who invests for Bain Capital, told the Israeli business website CTech. “The attendees of this mission are here to help counter the war’s economic disruption. We are focused on supporting and helping rebuild Israel’s world-class tech industry.”

According to an online application for the trip, a screenshot of which was obtained by The Intercept, attendees on the trip will have to pay their own way. “Attendees will organize their own travel,” the application says. “Participants will cover their own trip cost.”

Israel Defense Forces and Right-Wing Politicians

On the trip, the delegation will spend time with Israel’s senior political leadership as well as military figures. The online trip application says attendees will “receive confidential military and political briefings from former Israeli Prime Minister Nafatali Bennett, as well as current Members of Knesset and senior military leaders.”

The group, according to the itinerary, is scheduled to meet with Israel Defense Forces, or IDF, soldiers on Tuesday before taking part in a “solidarity tech reception” drawing on figures as diverse as the Israeli NBA player and venture capitalist Omri Casspi to the CEO of Goldman Sachs Israel. (In response to a request for comment, Goldman Sach’s U.K. office said it had not heard back from its Israeli office.)

The Israel Tech Mission appears to have been organized by Itrek, a nonprofit based in New York whose logo appears on the itinerary and list of attendees. Itrek sponsors weeklong “Israel Treks” to build “appreciation for Israel among present and future leaders” so they can understand its “complex reality,” according to the group’s website. (Itrek did not respond to a request for comment.)

Israel boasts a robust tech sector. While pro-Israel figures have long touted the country’s reputation as a “start-up nation,” criticisms have emerged in recent years pointing to the role of Israel’s defense sector in creating talent and funding research that becomes the locus of tech projects — effectively profiting off Israel’s occupation of Palestine. The cyber specialists of the Israeli army’s Unit 8200, for instance, are known for creating successful start-ups, sometimes involved in security work and even alleged rights abuses.

Close relationships between Israel’s security state, its tech sector, and the U.S. technology community are common. Tesla CEO Elon Musk met with Netanyahu and top IDF officials last month to discuss “the security aspects of artificial intelligence,” according to a readout of the conversation. The Israeli–Palestinian magazine +972 reported last month that advances in artificial intelligence have allowed the Israeli military to generate targets more rapidly than ever before.

Israel Tech Mission attendees, for their part, are looking to support Israel’s tech sector.

“After October 7th, we feel it is critical for venture capital and technology business leaders to stand with Israel,” David Siegel, CEO of Meetup and co-organizer of the mission, said in a press release. “Our trip was oversubscribed for attendees. The technology community recognizes the heightened need for support as many Israeli entrepreneurs and their workforces are on the front lines as reservists.”

Harvard’s Massive Endowment

The attendee list for the Israel Tech Mission includes a diverse roster of investors and business leaders. Among those listed are top officials at companies working in stock trading such as Vstock Transfer, a stock transfer firm, and TIFIN, a financial technology investment firm that employs artificial intelligence. Investors from private equity funds like Apollo Global Management and Entrepreneur Partners are also slated to participate.

The attendee list also includes business officials like Ariel Boyman, a vice president at Mastercard; Steve Miller, chief financial officer at the glasses retailer Warby Parker; Michael Kohen, who leads the autonomy and automation platform at John Deere; and Jeffrey Swartz, the former CEO of Timberland. (Vstock, TIFIN, Apollo, Entrepreneur Partners, Mastercard, Warby Parker, John Deere, and Swartz did not immediately respond to a request for comment.)

 Civil defense teams and citizens continue search and rescue operations after an airstrike hits the building belonging to the Maslah family during the 32nd day of Israeli attacks in Deir Al-Balah, Gaza on November 7, 2023. (Photo by Ashraf Amra/Anadolu via Getty Images)

Read our complete coverage

Israel’s War on Gaza

Also listed as an attendee is Adam Goldstein, managing director at Harvard Management Company, which helps oversee Harvard University’s over $50 billion endowment — the largest on Earth. The endowment investment fund has been accused in the past of investing nearly $200 million in companies that profit off Israel’s illegal settlements in the occupied Palestinian West Bank. (The Harvard Management Company did not immediately respond to a request for comment.)

Elite Ivy League colleges have become a flash point in the U.S. debate about Israel’s war on Gaza. Harvard has faced a backlash from donors. Billionaire investor Bill Ackman, for instance, has become a strident critic of pro-Palestine students and what he says is the school’s lackluster response to them — a battle fueled by years of resentment. And Harvard President Claudine Gay has faced, and resisted, calls to resign because of her response to pro-Palestinian activism and alleged antisemitism on campus.

In recent years, the movement for boycott, divestment, and sanctions against Israel has gained steam at the university. Last year, the student newspaper, the Harvard Crimson, faced a backlash for its endorsement of the BDS campaign — which, if successful, would see Goldstein’s Harvard Management Company divest from Israel.

While Israel Tech Mission delegates are looking to boost the tech sector in Israel, the Israeli war on Gaza is also being used as a pitch for tech firms like NSO Group to improve their image back in the United States. The company was blacklisted by the U.S. when its phone-hacking software Pegasus was shown to be involved in rights abuses.

Lobbyists in Washington working for the company, which has faced cash shortages, have been using the Israeli war on Gaza to refurbish the company’s reputation. In November, the NSO lobbyists wrote to the U.S. State Department to make the case for “the importance of cyber intelligence technology in the wake of the grave security threats posed by the recent Hamas terrorist attacks in Israel and their aftermath.”

The post Harvard Endowment Investor and Other Business Leaders Take a Solidarity Trip to Israel appeared first on The Intercept.

How to Authenticate Large Datasets

Published by Anonymous (not verified) on Sat, 16/12/2023 - 10:00pm in

Unlike any other point in history, hackers, whistleblowers, and archivists now routinely make off with terabytes of data from governments, corporations, and extremist groups. These datasets often contain gold mines of revelations in the public interest and in many cases are freely available for anyone to download. 

Revelations based on leaked datasets can change the course of history. In 1971, Daniel Ellsberg’s leak of military documents known as the Pentagon Papers led to the end of the Vietnam War. The same year, an underground activist group called the Citizens’ Commission to Investigate the FBI broke into a Federal Bureau of Investigation field office, stole secret documents, and leaked them to the media. This dataset mentioned COINTELPRO. NBC reporter Carl Stern used Freedom of Information Act requests to publicly reveal that COINTELPRO was a secret FBI operation devoted to surveilling, infiltrating, and discrediting left-wing political groups. This stolen FBI dataset also led to the creation of the Church Committee, a Senate committee that investigated these abuses and reined them in. 

Huge data leaks like these used to be rare, but today they’re increasingly common. More recently, Chelsea Manning’s 2010 leaks of Iraq and Afghanistan documents helped spark the Arab Spring, documents and emails stolen by Russian military hackers helped elect Donald Trump as U.S. president in 2016, and the Panama Papers and Paradise Papers exposed how the rich and powerful use offshore shell companies for tax evasion.

Yet these digital tomes can prove extremely difficult to analyze or interpret, and few people today have the skills to do so. I spent the last two years writing the book “Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data” to teach journalists, researchers, and activists the technologies and coding skills required to do just this. While these topics are technical, my book doesn’t assume any prior knowledge: all you need is a computer, an internet connection, and the will to learn. Throughout the book, you’ll download and analyze real datasets — including those from police departments, fascist groups, militias, a Russian ransomware gang, and social networks — as practice. Throughout, you’ll engage head-on with the dumpster fire that is 21st-century current events: the rise of neofascism and the rejection of objective reality, the extreme partisan divide, and an internet overflowing with misinformation.

My book officially comes out January 9, but it’s shipping today if you order it from the publisher here. Add the code INTERCEPT25 for a special 25 percent discount.

The following is a lightly edited excerpt from the first chapter of “Hacks, Leaks, and Revelations” about a crucial and often underappreciated part of working with leaked data: how to verify that it’s authentic.


Photo: Micah Lee

You can’t believe everything you read on the internet, and juicy documents or datasets that anonymous people send you are no exception. Disinformation is prevalent.

How you go about verifying that a dataset is authentic completely depends on what the data is. You have to approach the problem on a case-by-case basis. The best way to verify a dataset is to use open source intelligence (OSINT), or publicly available information that anyone with enough skill can find. 

This might mean scouring social media accounts, consulting the Internet Archive’s Wayback Machine, inspecting metadata of public images or documents, paying services for historical domain name registration data, or viewing other types of public records. If your dataset includes a database taken from a website, for instance, you might be able to compare information in that database with publicly available information on the website itself to confirm that they match. (Michael Bazzell also has great resources on the tools and techniques of OSINT.)

Below, I share two examples of authenticating data from my own experience: one about a dataset from the anti-vaccine group America’s Frontline Doctors, and another about leaked chat logs from a WikiLeaks Twitter group. 

In my work at The Intercept, I encounter datasets so frequently I feel like I’m drowning in data, and I simply ignore most of them because it’s impossible for me to investigate them all. Unfortunately, this often means that no one will report on them, and their secrets will remain hidden forever. I hope “Hacks, Leaks, and Revelations” helps to change that. 

The America’s Frontline Doctors Dataset

In late 2021, in the midst of the Covid-19 pandemic, an anonymous hacker sent me hundreds of thousands of patient and prescription records from telehealth companies working with America’s Frontline Doctors (AFLDS). AFLDS is a far-right anti-vaccine group that misleads people about Covid-19 vaccine safety and tricks patients into paying millions of dollars for drugs like ivermectin and hydroxychloroquine, which are ineffective at preventing or treating the virus. The group was initially formed to help Donald Trump’s 2020 reelection campaign, and the group’s leader, Simone Gold, was arrested for storming the U.S. Capitol on January 6, 2021. In 2022, she served two months in prison for her role in the attack.

My source told me that they got the data by writing a program that made thousands of web requests to a website run by one of the telehealth companies, Cadence Health. Each request returned data about a different patient. To see whether that was true, I made an account on the Cadence Health website myself. Everything looked legitimate to me. The information I had about each of the 255,000 patients was the exact information I was asked to provide when I created my account on the service, and various category names and IDs in the dataset matched what I could see on the website. But how could I be confident that the patient data itself was real, that these people weren’t just made up?

I wrote a simple Python script to loop through the 72,000 patients (those who had paid for fake health care) and put each of their email addresses in a text file. I then cross-referenced these email addresses with a totally separate dataset containing personal identifying information from members of Gab, a social network popular among fascists, anti-democracy activists, and anti-vaxxers. In early 2021, a hacktivist who went by the name “JaXpArO and My Little Anonymous Revival Project” had hacked Gab and made off with 65GB of data, including about 38,000 Gab users’ email addresses. Thinking there might be overlap between AFLDS and Gab users, I wrote another simple Python program that compared the email addresses from each group and showed me all of the addresses that were in both lists. There were several.

Armed with this information, I started scouring the public Gab timelines of users whose email addresses had appeared in both datasets, looking for posts about AFLDS. Using this technique, I found multiple AFLDS patients who posted about their experience on Gab, leading me to believe that the data was authentic. For example, according to consultation notes from the hacked dataset, one patient created an account on the telehealth site and four days later had a telehealth consultation. About a month after that, they posted to Gab saying, “Front line doctors finally came through with HCQ/Zinc delivery” (HCQ is an abbreviation for hydroxychloroquine).

Having a number of examples like this gave us confidence that the dataset of patient records was, in fact, legitimate. You can read our AFLDS reporting at The Intercept — which led to a congressional investigation into the group — here.

The WikiLeaks Twitter Group Chat

In late 2017, journalist Julia Ioffe published a revelation in The Atlantic: WikiLeaks had slid into Donald Trump Jr.’s Twitter DMs. Among other things, before the 2016 election, WikiLeaks suggested to Trump Jr. that even if his father lost the election, he shouldn’t concede. “Hi Don,” the verified @wikileaks Twitter account wrote, “if your father ‘loses’ we think it is much more interesting if he DOES NOT conceed [sic] and spends time CHALLENGING the media and other types of rigging that occurred—as he has implied that he might do.”

A long-term WikiLeaks volunteer who went by the pseudonym Hazelpress started a private Twitter group with WikiLeaks and its biggest supporters in mid-2015. After watching the group become more right-wing, conspiratorial, and unethical, and specifically after learning about WikiLeaks’ secret DMs with Trump Jr., Hazelpress decided to blow the whistle on the whistleblowing group itself. She has since publicly come forward as Mary-Emma Holly, an artist who spent years as a volunteer legal researcher for WikiLeaks.

To carry out the WikiLeaks leak, Holly logged in to her Twitter account, made it private, unfollowed everyone, and deleted all of her tweets. She also deleted all of her DMs except for the private WikiLeaks Twitter group and changed her Twitter username. Using the Firefox web browser, she then went to the DM conversation — which contained 11,000 messages and had been going on for two-and-a-half years — and saw the latest messages in the group. She scrolled up, waited for Twitter to load more messages, scrolled up again, and kept doing this for four hours until she reached the very first message in the group. She then used Firefox’s Save Page As function to save an HTML version of the webpage, as well as a folder full of resources like images that were posted in the group.

Now that she had a local, offline copy of all the messages in the DM group, Holly leaked it to the media. In early 2018, she sent a Signal message to the phone number listed on The Intercept’s tips page. At that time, I happened to be the one checking Signal for incoming tips. Using OnionShare — software that I developed for this purpose — she sent me an encrypted and compressed file, along with the password to decrypt it. After extracting it, I found a 37MB HTML file — so big that it made my web browser unresponsive when I tried opening it and which I later split into separate files to make it easier to work with — and a folder with 82MB of resources.

How could I verify the authenticity of such a huge HTML file? If I could somehow access the same data directly from Twitter’s servers, that would do it; only an insider at Twitter would be in a position to create fake DMs that show up on Twitter’s website, and even that would be extremely challenging. When I explained this to Holly (who, at the time, I still knew only as Hazelpress), she gave me her Twitter username and password. She had already deleted all the other information from that account. With her consent, I logged in to Twitter with her credentials, went to her DMs, and found the Twitter group in question. It immediately looked like it contained the same messages as the HTML file, and I confirmed that the verified account @wikileaks frequently posted to the group.

Following these steps made me extremely confident in the authenticity of the dataset, but I decided to take verification one step further. Could I download a separate copy of the Twitter group myself in order to compare it with the version Holly had sent me? I searched around and found DMArchiver, a Python program that could do just that. Using this program, along with Holly’s username and password, I downloaded a text version of all of the DMs in the Twitter group. It took only a few minutes to run this tool, rather than four hours of scrolling up in a web browser.

Note: After this investigation, the DMArchiver program stopped working due to changes on Twitter’s end, and today the project is abandoned. However, if you’re faced with a similar challenge in a future investigation, search for a tool that might work for you. 

The output from DMArchiver, a 1.7MB text file, was much easier to work with compared to the enormous HTML file, and it also included exact time stamps. Here’s a snippet of the text version:

[2015-11-19 13:46:39] <WikiLeaks> We believe it would be much better for GOP to win.

[2015-11-19 13:47:28] <WikiLeaks> Dems+Media+liberals woudl then form a block to reign in their worst qualities.

[2015-11-19 13:48:22] <WikiLeaks> With Hillary in charge, GOP will be pushing for her worst qualities., dems+media+neoliberals will be mute.

[2015-11-19 13:50:18] <WikiLeaks> She’s a bright, well connected, sadistic sociopath.

I could view the HTML version in a web browser to see it exactly as it had originally looked on Twitter, which was also useful for taking screenshots to include in our final report.

A screenshot of the leaked HTML file.

Along with the talented reporter Cora Currier, I started the long process of reading all 11,000 chat messages, paying closest attention to the 10 percent of them from the @wikileaks account — which was presumably controlled by Julian Assange, WikiLeaks’s editor — and picking out everything in the public interest. We discovered the following details:

  • Assange expressed a desire for Republicans to win the 2016 presidential election.
  • Assange and his supporters were intensely focused on discrediting two Swedish women who had accused him of rape and molestation, as well as discrediting their lawyers. Assange and his defenders spent weeks discussing ways to sabotage articles about his rape case that feminist journalists were writing.
  • After Associated Press journalist Raphael Satter wrote a story about harm caused when WikiLeaks publishes personal identifiable information, Assange called him a “rat” and said that “he’s Jewish and engaged in the ((())) issue,” referring to an antisemitic neo-Nazi meme. He then told his supporters to “bog him down. Get him to show his bias.”

You can read our reporting on this dataset at The Intercept. After The Intercept published this article, Assange and his supporters also targeted me personally with antisemitic abuse, and Russia Today, the state-run TV station, ran a segment about me. 

The techniques you can use to authenticate datasets vary greatly depending on the situation. Sometimes you can rely on OSINT, sometimes you can rely on help from your source, and sometimes you’ll need to come up with an entirely different method.

Regardless, it’s important to explain in your published report, at least briefly, what makes you confident in the data. If you can’t authenticate it but still want to publish your report in case it’s real — or in case others can authenticate it — make that clear. When in doubt, err on the side of transparency.

My book, “Hacks, Leaks, and Revelations,” officially comes out on January 9, but it’s shipping today if you order it from the publisher here. Add the code INTERCEPT25 for a special 25 percent discount.

The post How to Authenticate Large Datasets appeared first on The Intercept.

Sen. Elizabeth Warren Questions Meta Over Palestinian Censorship

Published by Anonymous (not verified) on Fri, 15/12/2023 - 5:00am in

In a letter sent Thursday to Meta chief executive Mark Zuckerberg, Sen. Elizabeth Warren, D-Mass., calls on the Facebook and Instagram owner to disclose unreleased details about wartime content moderation practices that have “exacerbated violence and failed to combat hate speech,” citing recent reporting by The Intercept.

“Amidst the horrific Hamas terrorist attacks in Israel, a humanitarian catastrophe including the deaths of thousands of civilians in Gaza, and the killing of dozens of journalists, it is more important than ever that social media platforms do not censor truthful and legitimate content, particularly as people around the world turn to online communities to share and find information about developments in the region,” the letter reads, according to a copy shared with The Intercept.

Since Hamas’s October 7 attack, social media users around the world have reported the inexplicable disappearance of posts, comments, hashtags, and entire accounts — even though they did not seem to violate any rules. Uneven enforcement of rules generally, and Palestinian censorship specifically, have proven perennial problems for Meta, which owns Facebook and Instagram, and the company has routinely blamed erratic rule enforcement on human error and technical glitches, while vowing to improve.

Following a string of 2021 Israeli raids at the Al-Aqsa Mosque in occupied East Jerusalem, Instagram temporarily censored posts about the holy site on the grounds that it was associated with terrorism. A third-party audit of the company’s speech policies in Israel and Palestine conducted last year found that “Meta’s actions in May 2021 appear to have had an adverse human rights impact … on the rights of Palestinian users to freedom of expression, freedom of assembly, political participation, and non-discrimination, and therefore on the ability of Palestinians to share information and insights about their experiences as they occurred.”

Users affected by these moderation decisions, meanwhile, are left with little to no recourse, and often have no idea why their posts were censored in the first place. Meta’s increased reliance on opaque, automated content moderation algorithms has only exacerbated the company’s lack of transparency around speech policy, and has done little to allay allegations that the company’s systems are structurally biased against certain groups.

The letter references recent articles by The Intercept, the Wall Street Journal, and other outlets’ reporting on the widespread, unexplained censorship of Palestinians and the broader discussion of Israel’s ongoing bombardment of Gaza. Last month, for instance, The Intercept reported that Instagram users leaving Palestinian flag emojis in post comments had seen those comments quickly hidden; Facebook later told The Intercept it was hiding these emojis in contexts it deemed “potentially offensive.”

“Social media users deserve to know when and why their accounts and posts are restricted, particularly on the largest platforms where vital information-sharing occurs.”

These “reports of Meta’s suppression of Palestinian voices raise serious questions about Meta’s content moderation practices and anti-discrimination protections,” Warren writes. “Social media users deserve to know when and why their accounts and posts are restricted, particularly on the largest platforms where vital information-sharing occurs. Users also deserve protection against discrimination based on their national origin, religion, and other protected characteristics.” Outside of its generalized annual reports, Meta typically shares precious little about how it enforces its rules in specific instances, or how its policies are determined behind closed doors. This general secrecy around the company’s speech rules mean that users are often in the dark about whether a given post will be allowed — especially if it even mentions a U.S.-designated terror organization like Hamas — until it’s too late.

 Civil defense teams and citizens continue search and rescue operations after an airstrike hits the building belonging to the Maslah family during the 32nd day of Israeli attacks in Deir Al-Balah, Gaza on November 7, 2023. (Photo by Ashraf Amra/Anadolu via Getty Images)

Read our complete coverage

Israel’s War on Gaza

To resolve this, and “[i]n order to further understand what legislative action might be necessary to address these issues,” Warren’s letter includes a litany of specific questions about how Meta treats content pertaining to the war, and to what extent it has enforced its speech rules depending on who’s speaking. “How many Arabic language posts originating from Palestine have been removed [since October 7]?” the letter asks. “What percentage of total Arabic language posts originating from Palestine does the above number represent?” The letter further asks Meta to divulge removal statistics since the war began (“How often did Meta limit the reachability of posts globally while notifying the user?”) and granular details of its enforcement system (“What was the average response time for a user appeal of a content moderation decision for Arabic language posts originating from Palestine?”).

The letter asks Meta to respond to Warren’s dozens of questions by January 5, 2024.

The post Sen. Elizabeth Warren Questions Meta Over Palestinian Censorship appeared first on The Intercept.

Take It to the Spank Bank

Published by Anonymous (not verified) on Fri, 15/12/2023 - 12:59am in

We had entered the uncanny valley, and everyone was naked.

The Future of Geography: How Power and Politics in Space Will Change Our World – review 

Published by Anonymous (not verified) on Wed, 13/12/2023 - 11:12pm in

In The Future of Geography: How Power and Politics in Space Will Change Our World, Tim Marshall analyses the geopolitical dynamics and consequences of space exploration. According to Gary Wilson, the book is an illuminating insight into the political geography of space and the dynamics between world powers as they continue to expand the space frontier.

The Future of Geography: How Power and Politics in Space Will Change Our World. Tim Marshall. Elliott & Thompson. 2023.

Find this book: amazon-logo

the future of geography by tim marshall_book cover showing the world mapWhile Tim Marshall’s previous works have firmly established him as a prominent authority on the politics of geography, in this new book he enters uncharted territory: an appraisal of the geopolitical dynamics and consequences of space exploration. In a series of earlier books Marshall considered the impact of geography on the possibilities and limitations of the projection of national power in some of the world’s political hotspots. The Future of Geography breaks new ground by probing how major world powers’ activities in space may come to shape the future of world politics in (until recently) ways which could not have been envisaged.

The Future of Geography begins with the premise that space is rapidly becoming an extension of earth, representing the latest arena for intense human competition. Although the book explores the space activities and objectives of a wide spectrum of states and other actors, Marshall makes clear from the outset that there are three main players to be aware of: China, the US and Russia.

Space is rapidly becoming an extension of earth, representing the latest arena for intense human competition.

The book is structured into three parts. The first of these is relatively brief and consists of two chapters which serve to provide useful context for the more substantive treatment of space activity found in part two. In chapter one Marshall traces interest in space back to the earliest recorded historical periods, noting that there is a long history of “studying stars,” stone circles and similar (phenomena perceived as otherworldly or mysterious). Beginning with the Babylonians, he charts astronomical advances through Greek and Roman times into the twentieth century, referencing the scientific contributions of the likes of Copernicus, Galileo and Newton along the way. In the second chapter, Marshall identifies the origins of modern space exploration in Germany’s wartime rocket development programme, before proceeding to explain the importance of the Cold War in generating further advances in space as part of the arms race between the US and the Soviet Union. A string of Soviet “firsts” in the 1950s and early 1960s, culminated in Yuri Gagarin being the first man in space, which lead to huge surges in American space budgets as they raced to put the first man on the moon.

A string of Soviet “firsts” in the 1950s and early 1960s, culminated in Yuri Gagarin being the first man in space, which lead to huge surges in American space budgets as they raced to put the first man on the moon.

Part Two of the book represents its substantive core. In its six chapters, Marshall first explores some of the general difficulties and tensions generated by modern space exploration, before appraising the space policies of the world’s major players in this arena. The geography of space cannot be understood in earthly terms and scales, but in chapter three Marshall presents a series of numerical markers which permit the reader to gain some sense of the enormity of distances in space. Although NASA regards space as beginning at 80 km, the International Space Station is located 400km into space, while medium and higher earth orbit extend the area for potential exploration yet further. Noting that over 80 countries have satellites in space, Marshall posits that “the idea that space is a global common is disappearing.”

Most existing international space treaties are regarded as outdated, products of the Cold War that fail to account for technological advances and the expansion of states with space-related aspirations.

This leads into chapter four’s consideration of efforts to regulate space by legal mechanisms. Most existing international space treaties are regarded as outdated, products of the Cold War that fail to account for technological advances and the expansion of states with space-related aspirations. At best, current space activity is governed by a series of non-binding, ad hoc agreements. Marshall lays out the various sources of potential scope for conflict or disagreement, including questions raised by the activities of private bodies in space and increased space debris from the deployment and destruction of satellites. While the need for new legal regimes to regulate and foster cooperation in space activity is accepted, such developments are hindered by the fact that the major three space powers agree on little.

China’s space programme is more militarised than the others and, despite being a slower starter in space exploration, now seeks to rival the International Space Station.

The following three chapters consider in turn the space policies of the three big space powers. China’s space programme is more militarised than the others and, despite being a slower starter in space exploration, now seeks to rival the International Space Station. It is the only country operating its own space station and is working with Russia on the creation of moon base. China established various “firsts” in space during the first decades of the twenty-first century, is home to over a hundred private space companies and has developed plans for the years ahead, including launching over 1,000 satellites within a decade. Within the US, space investment has fluctuated over time in accordance with its relative popularity. However, in 2019 the US launched a 16,000 strong Space Force and has invested heavily in early-warning satellites and laser weapons. While planning a lunar gateway space station, the US has collaborated increasingly with private firms such as Space X, the first company into space and which was contracted to build a lunar landing module. In contrast to initiatives taking place in China and the US, Marshall suggests that Russia’s “best days in cosmology look to be behind it.” However, Putin has sought to reinvigorate Russia’s space programme as tensions have increased between Russia and the West in recent years. Its efforts depend heavily on its cooperation with China, with Russia regarded as the junior partner in the alliance to undermine US superiority.

Putin has sought to reinvigorate Russia’s space programme as tensions have increased between Russia and the West in recent years. Its efforts depend heavily on its cooperation with China.

The emphasis on the big three powers should not overlook the fact that an increasing number of states have invested to some extent in space activity. A brief survey of some of these takes place in chapter eight, which considers the move towards regional space blocs, such as the US allied European Space Agency, within which Italy, Germany and France have all been major players. While states as varied as Japan and India, Israel and the UAE are all referenced in this overview, Marshall notes that nobody comes close to challenging the big three.

In the book’s final part Marshall ponders some of the possibilities for the future of space exploration. The penultimate chapter sees him present some hypothetical scenarios, which illustrate some of the potential sources of future conflict. He highlights the danger of pre-emptive strikes in space and potential for escalation of conflict in such a scenario, while the biggest threat is considered most likely to arise from competition between the US and China. The book concludes by acknowledging the commercial opportunities which exist in space, while observing the various practical difficulties which may limit the extent to which they represent realistic propositions.

The Future of Geography makes an important contribution to understanding the political geography of space exploration and its impact on relationships between the world’s major powers.

The Future of Geography makes an important contribution to understanding the political geography of space exploration and its impact on relationships between the world’s major powers. It is not always easy to engage with some of the space jargon deployed, which presumes a certain amount of knowledge of space terminology and factual knowledge. There is also scope for the impact of space activity on international relations to be drawn out in more specific terms on occasion, to more effectively illustrate the possible real-world effects it may come to have. However, in a challenging and problematic arena of international political activity, the book offers insights which further the appreciation of the political geography of space exploration and provide illuminating food for thought as to what the future of space may hold.

This post gives the views of the author, and not the position of the LSE Review of Books blog, or of the London School of Economics and Political Science. The LSE RB blog may receive a small commission if you choose to make a purchase through the above Amazon affiliate link. This is entirely independent of the coverage of the book on LSE Review of Books.

Image Credit: Artsiom P on Shutterstock.

Teachers: Was the Semester AI-pocalyptic or Was It AI-OK?

Published by Anonymous (not verified) on Tue, 12/12/2023 - 1:18am in

A survey conducted at the end of last year indicated that 30% of college students had used ChatGPT for schoolwork. Undoubtedly, the number has gone up since then. Teachers: what have your experiences been like with student use of ChatGPT and other large language models (LLMs)?

Here are some questions I’m curious about:

  • Did you talk to your students about how they may or may not use LLMs on work for your courses?
  • Have you noticed, or do you suspect, that your students have used LLMs illicitly on assignments for your courses?
  • Have you attempted to detect illicit LLM use among your students, and if so, what methods or technology did you use?
  • If you reported a student for illicit LLM use, how did your institution investigate and adjudicate the case?
  • Have you noticed a change in student performance that you suspect is attributable to increased prevalence of LLMs?
  • Did you incorporate LLM-use into assignments, and if so, how did that go?
  • Did you change or add assignments (or their mechanics/administration) in response to increased awareness of LLMs that do not ask the students to use the technology? (e.g., blue book exams in class, oral exams)
  • Have your LLM-related experiences this semester prompted you to think you ought to change how you teach?

I’m also curious about which other questions I should be asking about this.

 

 

 

The post Teachers: Was the Semester AI-pocalyptic or Was It AI-OK? first appeared on Daily Nous.

Philosophical Uses for LLMs: Modeling Philosophers

Published by Anonymous (not verified) on Wed, 06/12/2023 - 5:14am in

Now that OpenAI has made it possible for members of the (paying) public to customize its large language model (LLM), ChatGPT, with special instructions, extra knowledge, and particular combinations of skills, the prospects of using it to create useful, interesting, and maybe even insightful “model philosophers” have improved.


[made with DALL-E]

(After all, what a technology ends up being able to do is not just a function of the technology itself, but, among other things, who has gotten to play with it.)

For an example of this, consider LucretiusGPT.

LucretiusGPT was created by research analyst Kelly Truelove. It’s an LLM version of Lucretius, or, as Truelove puts it, “a customized version of ChatGPT that is especially familiar with the ancient Roman poet Lucretius, his grand poem “On the Nature of Things,” and the philosophy of Epicurus presented in the 2,000-year-old work.”

In a dialogue with LucretiusGPT (it calls itself “Lucretius”), Truelove asks about “his” famous six-part poem and how it could be extended include a part on computers and artificial intelligence.

In response, LGPT presents an outline of “Book VII: The Age of Silicon and Reason.” Truelove notes: that the six-part structure of the proposed extension seems to correlate with what would be the preceding six “books” of the poem. LGPT replies:

Indeed, the proposed six-part structure for extending “De Rerum Natura” to encompass the developments of computing devices and artificial intelligence mirrors the original six-book layout of my work. Each part of this hypothetical extension aligns with the thematic progression and philosophical depth found in the original poem.

LGPT then goes on to explain the correlations for each part, noting:

In this extended structure, each part would serve to bridge the ancient Epicurean thought with modern scientific and technological advancements, maintaining the poem’s original spirit of exploring and understanding the natural world, human experience, and the implications of our advancements.

Truelove asks LGPT to write the poem, and it does. You can read it here.

The exchange afterwards was striking, I thought:

KT: Your addition deviates from “De Rerum Natura” in an interesting sense: It has a clear conclusion and even an epilogue. By contrast, “De Rerum Natura” ends abruptly.

LucretiusGPT: Indeed, you astutely observe a notable deviation in my proposed addition from the original “De Rerum Natura.” The original work is known for its abrupt ending, which has been a subject of much scholarly debate. Some suggest that the poem was unfinished at the time of my death, while others propose that the ending as it stands was intentional, reflecting the incomplete and ongoing nature of human understanding of the universe.

In contrast, the addition I proposed, which includes a conclusion and an epilogue, offers a more definitive closure. This choice was made to provide a sense of completion to the new themes introduced, particularly the advancements in computing and artificial intelligence. The epilogue serves to tie these modern concepts back to the Epicurean pursuit of understanding and tranquility, providing a reflective summary of the journey through the poem.

However, in keeping with the spirit of the original work, this closure does not imply that all questions are answered or that the exploration of nature and human understanding is complete. Instead, it acknowledges the ongoing nature of inquiry and the ever-evolving understanding of the universe, while offering a moment of contemplative closure to the specific themes discussed in the proposed addition.

It’s a bit of an improvement since last year’s attempt to talk philosophy with ChatGPT.

Check out the whole thing at TrueSciPhi, where Truelove has documented some of his explorations of this technology.

It would be interesting to see more “model philosophers” emerge. They might (eventually) be useful as tools for exploring possible extensions of their thoughts to matters they did not consider. It could be quite fascinating to see model philosophers converse with one another in ways that history, geography, language barriers, and other contingencies did not allow for. And they might make for good conversation partners for us. With an audio interface and a set of earbuds, you can wander about campus conversing with Kant.

A philosopher could create a model of themselves, too, trained on their own writings and notes, as well as empirical information related to their own work, and endowed with certain reasoning and research skills. One could then ask it: “what do I think about X?”, where X is something the philosopher hasn’t worked out a view on yet. The result of course is not a substitute for thought, but it could be useful, educational, and possibly insightful. One could feed one’s model the writings of others and ask, “what challenges, if any, does these texts pose to my views?” And so on. (Recall “Hey Sophi“.)

Are you aware of other model philosophers created with customized versions of ChatGPT? Have you created a model of yourself? Let us know.

By the way, if you’re unimpressed with the current technology, just imagine its capabilities 10 or 20 years down the road. Discussion of its uses, benefits, risks, implications, etc., welcome, as usual.

Related:
Two Cultures of Philosophy: AI Edition
Shaping the AI Revolution in Philosophy

The post Philosophical Uses for LLMs: Modeling Philosophers first appeared on Daily Nous.

Pages