Home >Technology peripherals >AI >World Weekly丨AI 'Prism”?
In 2013, former U.S. defense contractor employee Edward Snowden disclosed to the media the "Prism Project" of the U.S. National Security Agency's global surveillance program, revealing the U.S. spy agency's secret absorption of global private communications and private data. The inside story opened the "prism door" that shocked the world.
June 5 marks the tenth anniversary of the exposure of the "Prism Gate" scandal. In the past ten years, surveillance in the United States has not only not stopped, but has become worse and more extreme than it was ten years ago. In this week's meeting between US President Biden and British Prime Minister Sunak, they focused on artificial intelligence and other issues. With the advancement of technology, people's concerns about "global surveillance" by Western countries have further intensified.
On June 8, local time, at the White House of the United States, visiting British Prime Minister Sunak and Biden discussed the future of artificial intelligence.
Biden said that the global economy is undergoing the biggest change since the Industrial Revolution, and artificial intelligence will play an important role.
Sunak said that artificial intelligence can bring incredible benefits to society, the economy and everyone.
According to The Times, the British government is considering setting up an international artificial intelligence regulatory agency in London, modeled on the International Atomic Energy Agency, to build the UK into a global artificial intelligence center, and plans to host the first global artificial intelligence summit this fall.
In March of this year, the Future of Life Institute, a non-profit organization focusing on artificial intelligence technology research, issued an open letter signed by more than 1,000 technical experts and researchers, calling for a suspension of the development of large-scale artificial intelligence models for at least 6 months. , only when it is ensured that its effects are positive and risks are controllable, development can continue. Industry insiders such as Silicon Valley Iron Man Musk and Apple co-founder Wozniak have signed the document.
American entrepreneur Musk: Artificial intelligence is more dangerous than poorly designed and improperly operated airplanes or cars.
However, in the eyes of some Western politicians, the competition on the artificial intelligence track is not just about seizing opportunities in the industry.
Also in March this year, British Secretary of State for Security Affairs Tom Tugendhat wrote an article in the "Daily Telegraph" that he hoped that the United Kingdom could open a new intelligence agency focused on "open source intelligence." The agency will use artificial intelligence technology to collect and analyze information from public sources and use this "open source intelligence" to assist traditional intelligence agencies such as MI5 and MI6.
At the Border Security Expo in El Paso, Texas, in May this year, equipment such as robot dogs and surveillance towers based on advanced technologies such as artificial intelligence were launched to the market.
More than 1,700 people attended the meeting, including industry insiders and many U.S. government officials. One of the topics they discussed was how to accelerate the construction of a "smart wall" on the US-Mexico border, that is, using advanced technologies such as biometrics, facial recognition, motion sensors, and license plate readers to create an all-weather border monitoring system.
According to US media VICE in May, the Department of Homeland Security also uses an artificial intelligence tool called BabelX to monitor travelers, including US citizens, refugees and asylum seekers, and can link their Social Security numbers to social media Media information and location information are linked.
However, in 2020, ClearviewAI, an American facial recognition application service company, was attacked by hackers and leaked more than 3 billion face data. This major incident caused people to worry about privacy security.
In the era of artificial intelligence, information security is becoming more and more important. Once the abuse of technology leads to the leakage of information in key areas, the consequences are likely to be more serious than the "Prism Project" ten years ago.
On June 6, Snowden was interviewed by American journalist Greenwald.
Reporter: You have tried to rebuild privacy security and downplay state surveillance. Ten years later, what do you want to say?
Snowden: It’s not like in a Hollywood movie. One day you release secret documents and the next day it’s sunshine, roses and rainbows. That’s not how the real world works, and it’s certainly not how government intelligence agencies operate. The way.
Ten years after the "Prism Gate", Snowden, who was charged with serious crimes and wanted, went into exile in Russia. The US authorities' surveillance of other countries has not only failed to curb, but has intensified.
Chinese Foreign Ministry Spokesperson Wang Wenbin: Over the past 10 years, the international community has seen more and more clearly that the United States claims to be the defender of democracy and freedom, but in fact it abuses its technological advantages to steal information from various countries and violates the rights and freedoms of people of all countries. .
According to French communications technology expert Lefebir, the United States has done its best in all technical fields, especially those related to military and intelligence activities. Why do this? Because they want to. The so-called terrorism, espionage, security control, etc. are all excuses. The United States considers itself an empire and feels the need to control both its enemies and its friends.
For a long time, the United States has been continuously enriching the “toolbox” of cyber weapons.
In May of this year, China's National Computer Virus Emergency Response Center released a "Matrix" investigation report, revealing the covert methods used by the CIA to conduct network sabotage operations, and "tailor-made" secret-stealing tools for different devices.
For example, a hacker program called "Weeping Angel" developed by the CIA's "Embedded Devices Branch" (EDB) mainly targets Samsung smart TVs. TVs infected with this hacker program will be in a "fake shutdown" state. In this state, the user thinks the TV is turned off, but in fact it becomes a bug that records the conversations in the room and sends them to the CIA server through the Internet.
Reporter: "Weeping Angels" can turn my TV into a listening device, but what if I turn off the TV?
American network security expert Schumann: When you turn off the TV, the TV does not really turn off. There is a small red light here, which means that the computer program is still running and can still receive remote control signals. Even if the TV is turned off, the CIA can listen through the TV microphone.
The CIA's "Mobile Devices Branch" (MDB) has developed a variety of attack "weapons" targeting smartphones. Infected mobile devices will send the user's geographical location, audio and text information to the CIA, and will also Secretly activate your phone’s camera and microphone without your knowledge.
Director of the Russian Council for International Affairs Kortunov: The United States is extremely worried about interference in its internal affairs by other countries. However, at the same time, the United States has used surveillance methods to influence the internal political processes of other countries more than once.
In the novel "1984", George Orwell depicts a ubiquitous surveillance society controlled by "Oceania". Today, the United States is turning the fictional "Oceania" into reality. In the context of rapid technological development, information warfare and intelligence warfare continue to disturb the world order, exacerbating the complexity and stalemate of existing conflicts. Who is profiting from this deserves high vigilance from the international community.
Source: CCTV News Client
The above is the detailed content of World Weekly丨AI 'Prism”?. For more information, please follow other related articles on the PHP Chinese website!