David Silver [the creator of AlphaZero] hasn’t answered my question about whether machines can set up their own goals. He talks about subgoals, but that’s not the same. That’s a certain gap in his definition of intelligence. We set up goals and look for ways to achieve them. A machine can only do the second part.
So far, we see very little evidence that machines can actually operate outside of these terms, which is clearly a sign of human intelligence. Let’s say you accumulated knowledge in one game. Can it transfer this knowledge to another game, which might be similar but not the same? Humans can. With computers, in most cases you have to start from scratch.
Curiosity - the drive for information - is often perceived as a dangerous trait. This is exacerbated by the perception that when something is forbidden, curiosity towards it increases. […]
This research demonstrated the so-called “forbidden fruit effect”, in which unavailable options elicit curiosity – the desire to know more – even when people were completely aware that the forbidden option did not differ from other options in terms of expected outcome, uncertainty (hidden values), and visual salience.
The madman theory is a political theory commonly associated with U.S. President Richard Nixon’s foreign policy. He and his administration tried to make the leaders of hostile Communist Bloc nations think Nixon was irrational and volatile. According to the theory, those leaders would then avoid provoking the United States, fearing an unpredictable American response.
The author finds that perceived madness is harmful to general deterrence and is sometimes also harmful in crisis bargaining, but may be helpful in crisis bargaining under certain conditions.
For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret.
The company, Crypto AG, got its first break with a contract to build code-making machines for U.S. troops during World War II. Flush with cash, it became a dominant maker of encryption devices for decades, navigating waves of technology from mechanical gears to electronic circuits and, finally, silicon chips and software.
The Swiss firm made millions of dollars selling equipment to more than 120 countries well into the 21st century. Its clients included Iran, military juntas in Latin America, nuclear rivals India and Pakistan, and even the Vatican.
But what none of its customers ever knew was that Crypto AG was secretly owned by the CIA in a highly classified partnership with West German intelligence. These spy agencies rigged the company’s devices so they could easily break the codes that countries used to send encrypted messages. […]
“It was the intelligence coup of the century,” the CIA report concludes. […]
The program had limits. America’s main adversaries, including the Soviet Union and China, were never Crypto customers.
When privately owned land vanishes under the water, who does it belong to?
The problem is a result of the state’s rapidly changing landscape. About 80 percent of Louisiana’s coast is privately owned. But, under an old law, as coastal erosion and sea level rise turn the land into open water the area becomes property of the state, including the mineral rights underneath.
Private landowners have become more adamant about restricting access to water on their property in order to assert their claim to the minerals underneath it. But boaters often have difficulty figuring out where private property ends and public waterways begin. Since 2003, Louisiana law does not require landowners to post signs demarcating their property. The resulting confusion led the Bass Anglers Sportsman Society, or BASS, to announce in 2017 that it would no longer host professional fishing tournaments in Louisiana tidal waters, where fishers risk being arrested.
On Monday, the Justice Department announced that it was charging four members of China’s People’s Liberation Army with the 2017 Equifax breach that resulted in the theft of personal data of about 145 million Americans.
Using the personal data of millions of Americans against their will is certainly alarming. But what’s the difference between the Chinese government stealing all that information and a data broker amassing it legally without user consent and selling it on the open market? Both are predatory practices to invade privacy for insights and strategic leverage. […]
Equifax is eager to play the hapless victim in all this. […] “The attack on Equifax was an attack on U.S. consumers as well as the United States,” [Equifax’s chief executive] said. […]
According to a 2019 class-action lawsuit, the company’s cybersecurity practices were a nightmare. The suit alleged that “sensitive personal information relating to hundreds of millions of Americans was not encrypted, but instead was stored in plain text” and “was accessible through a public-facing, widely used website.” Another example of the company’s weak safeguards, according to the suit, shows the company struggling to use a competent password system. “Equifax employed the username ‘admin’ and the password ‘admin’ to protect a portal used to manage credit disputes,” it read.
Though the attack was quite sophisticated — the hackers sneaked out information in small, hard to detect chunks and routed internet traffic through 34 servers in over a dozen countries to cover their tracks — Equifax’s apparent carelessness made it a perfect target.
According to a 2019 class-action lawsuit, the company’s cybersecurity practices were a nightmare. The suit alleged that “sensitive personal information relating to hundreds of millions of Americans was not encrypted, but instead was stored in plain text” and “was accessible through a public-facing, widely used website.” Another example of the company’s weak safeguards, according to the suit, shows the company struggling to use a competent password system. “Equifax employed the username ‘admin’ and the password ‘admin’ to protect a portal used to manage credit disputes,” it read.
The takeaway: While almost anything digital is at some risk of being hacked, the Equifax attack was largely preventable.
Many New Yorkers are familiar with the iconic Waldorf Astoria, which sits on Park Avenue. But they might be surprised to learn that this is the second iteration of the luxury hotel. The original was located along Manhattan’s fashionable Fifth Avenue, and the structure took up the entire block between 33rd and 34th streets. But in late November 1929 — after the stock market had crashed and the slow slide into the Great Depression began — workers began demolishing it. […] The demolition of the old hotel, completed by the winter of 1930, made way for the construction of the ultimate expression of the city’s architectural ambitions: the Empire State Building.
The original hotel started as two hotels on Fifth Avenue built by feuding relatives. The first hotel, the 13-story, 450-room Waldorf Hotel, designed by Henry Janeway Hardenbergh in the German Renaissance style, was opened on March 13, 1893, at the corner of Fifth Avenue and 33rd Street, on the site where millionaire developer William Waldorf Astor had his mansion. […]
On November 1, 1897, John Jacob Astor IV opened the 17-story Astoria Hotel on an adjacent site, and leased it to Boldt. The hotels were initially built as two separate structures, but Boldt planned the Astoria so it could be connected to the Waldorf by an alley. Peacock Alley was constructed to connect the two buildings,[21] and the hotel subsequently became known as the “Waldorf-Astoria”, the largest hotel in the world at the time.
With about a dozen trucks an hour setting off from the avocado belt in Mexico’s western state of Michoacán for the U.S., armed robbers are zeroing in on the fast-growing, multibillion-dollar industry. The rise in avocado-related crime has turned parts of the state into no-go areas even for the police. […]
Until recently, Mexico’s organized crime groups’ main source of revenues from avocados centred around extortion — demands for protection money from farmers. But the sharp fall in the price of Mexican opium paste has forced them to diversify, according to analysts.
Increasingly they have started hijacking truckloads of fruit for export. […] The rise in avocado crime is thus indirectly linked to America’s opioid crisis. Americans’ increased use of fentanyl, a synthetic opioid used for pain relief, pushed down the price of heroin, which in turn slashed the price of Mexican opium. […]
Demand for avocados jumps ahead of the Super Bowl, America’s biggest sporting event, with Mexico shipping a record 127,000 tonnes to the U.S. for the occasion. Overall production is rising, hitting 1.09 million tonnes in the 2018-19 season, up nearly 4 per cent from the 1.05 million produced in 2017-18. Exports last season rose 5.4 per cent. Sales to the U.S., the largest importer of Mexican avocados, bring in almost US$2 billion a year, much of it going to smallholders.
{ Google Maps utilizes GPS and location data from mobile devices to determine if there is traffic congestion on a particular street. The app will then redirect users to less trafficked streets to avoid traffic. Using a hand cart filled with 99 active cell phones connected to Google Maps, artist Simon Weckert showed how he could create fake traffic jams in Google Maps simply by walking around the streets of Berlin. | Bleeping Computer | Continue reading }
Several delivery services, including Postmates, Seamless, Grubhub, and DoorDash, offer food from restaurants without their explicit permission. The delivery apps pull up restaurant menus listed online, from which customers make their selections, and couriers working for the apps place orders on their behalf. The process essentially inserts third-party apps as middlemen into a service many restaurants say they want control over, or wish to opt out of entirely.
For China’s chronically underpaid physicians (the average starting salary for a junior physician was $730 a month in 2018), the best route is to avoid becoming a low-paid general practitioner, especially in the countryside, and opt for a career as a higher paid specialist. And if that career choice doesn’t work, pharmaceutical company kickbacks commonly do. And if kickbacks don’t suffice, many doctors simply accept “red envelopes” of cash to ensure basic services are rendered correctly.
These well-known practices deepen patient mistrust and cynicism, and have led to an epidemic of patient violence against Chinese doctors and nurses, including an attack on an opthamologist last week in Beijing (the weapon was a “vegetable chopper”). As far back as 2008, 48% of Chinese hospitals reported violent attacks against health workers. In a recent survey of general practitioners in Hubei Province, the source of the new coronavirus, 18.9% of respondents reported exposure to physical workplace violence in the preceding year.
Low pay, low status and the threat of violence has predictably depressed interest in the caring professions. In 2018, China had two doctors per 1,000 inhabitants, compared with 2.6 in the United States, 2.8 in Canada, and a world-beating 5.2 in Austria. More alarming, the profession is aging. […]
For now, China can treat Wuhan’s shortage of doctors as a health crisis and mobilize qualified personnel from across China to work in the city. Indeed, 6,000 medical workers from across China have either arrived in the Wuhan area or will soon, and they will alleviate much of the pressure building up in hospital corridors.
The toilet manufacturer Toot Ltd. unveiled the “mobile toilet concept” at the CES tech show held in Las Vegas in early January. The company intends to develop an exclusive app that brings a portable restroom trailer to a spot near the location the call is made.
The concept envisions a small trailer converted into a “private bathroom” pulled by a car to a designated spot.
Now we learn that San Diego City Attorney Mara Elliott gave the approval to General Electric to outfit 4,000 new “smart street lights” with cameras and microphones in 2017. […]
The City paid $30 million for the contract. But the larger issue is that General Electric has already made more than $1 billion dollars selling San Diego residents’ data to Wall Street.
The City of San Diego gave what appears to be unrestricted rights to the private data, according to the contract. […]
San Diego is now home to the largest mass surveillance operation across the country.
General Electric and its subsidiaries* have access to all the processed data in perpetuity with no oversight.
Founded in 1945 by University of Chicago scientists who had helped develop the first atomic weapons in the Manhattan Project, the Bulletin of the Atomic Scientists created the Doomsday Clock two years later, using the imagery of apocalypse (midnight) and the contemporary idiom of nuclear explosion (countdown to zero) to convey threats to humanity and the planet. The decision to move (or to leave in place) the minute hand of the Doomsday Clock is made every year by the Bulletin’s Science and Security Board in consultation with its Board of Sponsors, which includes 13 Nobel laureates. The Clock has become a universally recognized indicator of the world’s vulnerability to catastrophe from nuclear weapons, climate change, and disruptive technologies in other domains.
To: Leaders and citizens of the world
Re: Closer than ever: It is 100 seconds to midnight
Date: January 23, 2020