Category Archives: Security

Angry FBI Agent Attacks Traffic Police to Avoid Parking Ticket

This is such a bizarre story from NYC for many reasons.

First, a purportedly undercover agent jumps out from a Jeep Cherokee parked in a bus stop and generates a huge scene drawing widespread attention. What? How could anyone be any worse at avoiding observation?

Second, excessive physical force over a parking ticket deserves serious attention. Completely unnecessary, disproportionate and unprofessional of the FBI.

Third, after the FBI agent demanded the fine be voided and was told it was impossible he grabbed the ticketing device “to somehow cancel his ticket, with a void slip popping out” of the traffic policeman’s printer on his belt.

Talk about blowing cover yet again. What’s this magic void button a traffic policeman didn’t even know about?

Fortunately nearby police intervened and managed to control the FBI agent who clearly was having a mental breakdown.

Fourth, the FBI agent was taken to the police station where he paid the parking ticket (even though he had printed a void slip) and was released without further charges. I wonder if there is a penalty for printing a false void receipt.

Each one of these steps offers a lot to unpack for those thinking about how justice functions.

Above all, the third and fourth points suggest a very simple resolution was available that would have left alone an undercover operation allegedly important enough to block a bus stop (traffic tickets can even improve cover, but more importantly the FBI couldn’t park in that spot if parking rules weren’t enforced). Physical harm to an innocent traffic officer was the real crime here.

Good 1964: “Speculations Concerning the First Ultraintelligent Machine”

Irving John Good was giving talks in 1962 and 1963 on artificial intelligence, which he turned into a now famous paper called “Speculations Concerning the First Ultraintelligent Machine”. As he put it at the time:

Based on talks given in a Conference on the Conceptual Aspects of Biocommunications, Neuropsychiatric Institute, University of California, Los Angeles, October 1962; and in the Artificial Intelligence Sessions of the Winter General Meetings of the IEEE, January 1963 [1, 46]. The first draft of this monograph was completed in April 1963, and the present slightly amended version in May 1964.

I am much indebted to Mrs. Euthie Anthony of IDA for the arduous task of typing.

That last note really caught my eye. How ironic to be giving thanks to a woman for typing this paper as it was about machines that would remove the need for women to type papers (let alone give them thanks).

It reminds me of the fact that the very poetic term “computer” was used for a while to describe predominantly female workers in the field of data entry (e.g. rocket science). Nobody other than historians today might think of computers as female, even though far too many people today tend to portray artificial intelligence as their idealized woman.

From there I have to highlight the opening line of Good’s paper:

The survival of man depends on the early construction of an ultra-intelligent machine.

What if we reframe this as early evidence of “mommy-tech”, which tends to be all too common in Silicon Valley?

In other words, men who leave their mothers and embark on a successful well-paid career as engineers in technology soon “innovate” by thinking of ways to make machines replicate their mothers.

Self-driving cars are about children being raised thinking their mother should drive them around (e.g. the Lift System of apartheid was literally white mothers driving their kids to school). Dishwashers are popular in cultures where mothers traditionally cleaned plates after a meal.

Is mommy-tech liberating for women? In theory a machine being introduced to take over a task could be thought as a way to liberate the person formerly tasked with that job. However that does not seem to be at all how things work out, because imposing a loss is not inherently translatable to successful pivot into new tasks and opportunities.

If nothing else, more of something obviously is not better when that thing is loss. More loss, more death, more destruction only sounds good in places of privilege where a rebuild or a repeat is even conceivable.

Good kind of points this out himself accidentally in part two of his paper where he calls intelligence entirely zero sum, such that machines getting more intelligent would mean “man would be left far behind“.

Let an ultraintelligent machine be defined as a machine that can far surpass all the intellectual activities of any man however clever. Since the design of machines is one of these intellectual activities, an ultraintelligent machine could design even better machines; there would then unquestionably be an “intelligence explosion,” and the intelligence of man would be left far behind (see for example refs. [22], [34], [44]). Thus the first ultraintelligent machine is the last invention that man need ever make, provided that the machine is docile enough to tell us how to keep it under control. It is curious that this point is made so seldom outside of science fiction. It is sometimes worthwhile to take science fiction seriously.

Indeed, Wollstonecraft’s daughter invented science fiction (Frankenstein) for a very good reason, which I often explain in my presentations. However, Good’s analysis here is not good for reasons that rarely are discussed.

To my ears, trained in history of power contention, it’s like hearing men who have said women becoming intelligent (e.g. allowed to speak, read, educate) would represent a dangerous challenge: “docile enough to tell us how to keep it under control”.

And it doesn’t even have to be men and women in this “struggle” for domination.

Imagine a context of colonialism or American history of Manifest Destiny, which similarly centered on oppressors keeping “intelligence” of the oppressed under control.

If nothing else you can’t deny that America ruthlessly and systemically engaged in denying Blacks education, as Wollstonecraft very sagely had warned in the 1790s, which most Americans are completely ignorant about in order to keep them docile.

Perhaps containment of intelligence should be framed like filtration of water or direction of energy; rather than holding back we must seek ways to increase output on measured outcomes. It’s not that safety becomes dominant or pervasive, instead that loss is measured properly and accounted for instead of falsely implied as something inherent to gain.

Just like industrialization created an emaciation of male power, a domain shift that scared many into bunk response theory (false power projection) such as fascism, there are men today trying to gin up fear of gains (ultraintelligence) as some kind of loss.

It’s interesting to think about the answers to these power and control problems related to technology and specifically intelligence being sorted out way back in the 1700s, yet today people often frame them as recent or needing to be solved for the first time.

Ethiopia Shutoff Internet Almost Two Years Ago: What Do We Know Now?

Way back in November 2020, in the hours before war erupted within Ethiopia, an intentional Internet outage was forced upon its northern region.

Network data from the NetBlocks internet observatory confirm that internet has been cut regionally in Ethiopia from 1 a.m. Wednesday 4 November 2020 local time. Metrics corroborate widespread reports of a data and telephony blackout in the northern region of Tigray, which are ongoing as of midnight.

The shutdown has continued and some recent reports have tried to estimate the result.

With Tigray rendered into an unreachable island, it is impossible for one to present an accurate assessment of the impact of the blockade of the Internet. For, ironically, that would require the Internet or any other means of connecting to Tigray to study the damage that has been inflicted on Tigray by the blockade. This, however, does not mean that one cannot make a reasonable prediction by analyzing what damage the total shutdown of the internet in this day and age can do to an economy and society that were already struggling. Families have been separated for more than a year; promising start-up businesses have been forced to shut down; universities have stopped functioning; banking services are unavailable; and all other Internet-based businesses have gone bankrupt.

An island is right. Brookings gives a sharp contrast between Ethiopia’s infrastructure and neighboring states.

Even though the country is the second-most populous in Africa, its 110 million people are among the most digitally isolated on the continent. The country’s internet penetration of 18 percent is just below Guinea and above the Democratic Republic of the Congo—a remarkable contrast to neighboring Kenya where the internet penetration rate is 85 percent and in Nigeria, where it is 73 percent.

Freedom House further explains how forced outages have been wielded.

The communications restrictions also impeded the documentation of rights abuses and distribution of humanitarian aid; security forces have blockaded food supplies to cause mass food insecurity, weaponized sexual violence, and attacked aid workers. Ethio Telecom blamed “law enforcement operations” for the shutdown, releasing closed-circuit television (CCTV) camera footage of armed individuals forcefully entering their Mekelle compound and deactivating the power distribution source. […] As a landlocked country, Ethiopia has no direct access to submarine cable landing stations; instead, it connects to the international internet via satellite, a fiber-optic cable that passes through Sudan and connects to its international gateway, and another that passes through Djibouti to an international undersea cable. All connections to the international internet are completely centralized under Ethio Telecom, allowing the government to cut off traffic at will.

The US Department of State puts it like this.

Telecommunication, electricity, and other public services remain largely unavailable in the Tigray region as well as other conflict areas.

It all begs the question of what can be known about a region such as this being forcibly closed from communication with the outside world.

Tracking Privacy Harms in America

Here are two excellent resources to help untangle the giant spaghetti of emerging privacy regulations spreading though America right now.

  1. A detailed IAPP US State Privacy Legislation Tracker showing California, Colorado, Utah and Virginia moving first with Oklahoma coming up soon.
    Source: IAPP
  2. A Privacy Harms paper by Citron and Solove:

    Privacy harms consist of various different types, which to date have been recognized by courts in inconsistent ways. Our typology of privacy harms elucidates why certain types of privacy harms should be recognized as cognizable. […] In many cases, harm should not be required because it is irrelevant to the purpose of the lawsuit. Currently, much privacy litigation suffers from a misalignment of enforcement goals and remedies.

These resources perhaps even put to rest a kind of bogus “market” analysis I have found all too common in technology and economics circles, where people bizarrely attempt to argue no harm exists from a loss of privacy and/or only “big city folk” or coastal areas care about privacy.