The USPTO wants to know if artificial intelligence can own the content it creates

The US office responsible for patents and trademarks is trying to figure out how AI might call for changes to copyright law, and it’s asking the public for opinions on the topic. The United States Patent and Trademark Office (USPTO) published a notice in the Federal Register last month saying it’s seeking comments, as spotted by TorrentFreak.

The office is gathering information about the impact of artificial intelligence on copyright, trademark, and other intellectual property rights. It outlines thirteen specific questions, ranging from what happens if an AI creates a copyright-infringing work to if it’s legal to feed an AI copyrighted material.

It starts off by asking if output made by AI without any creative involvement from a human should qualify as a work of authorship that’s protectable by US copyright law. If not, then what degree of human involvement “would or should be sufficient so that the work qualifies for copyright protection?”

Other questions ask if the company that trains an AI should own the resulting work, and if it’s okay to use copyrighted material to train an AI in the first place. “Should authors be recognized for this type of use of their works?” asks the office. “If so, how?”

The office, which, among other things, advises the government on copyright, often seeks public opinion to understand new developments and hear from people who actually deal with them. Earlier this year, the office similarly asked for public opinion on AI and patents.

Source: The USPTO wants to know if artificial intelligence can own the content it creates – The Verge

Boffins harnessed the brain power of mice to build AI models that can’t be fooled

researchers recorded the brain activity of mice staring at images and used the data to help make computer vision models more robust against adversarial attacks.

Convolutional neural networks (CNNs) used for object recognition in images are all susceptible to adversarial examples. These inputs have been tweaked in some way, whether its adding random noise or changing a few pixels here or there, that forces a model to incorrectly recognize an object. Adversarial attacks cause these systems to mistake an image of a banana for a toaster, or a toy turtle for a rifle.

[…]

, a group of researchers led by Baylor College of Medicine, Texas, have turned to mice for inspiration, according to a paper released on arXiv.

“We presented natural images to mice and measured the responses of thousands of neurons from cortical visual areas,” they wrote.

“Next, we denoised the notoriously variable neural activity using strong predictive models trained on this large corpus of responses from the mouse visual system, and calculated the representational similarity for millions of pairs of images from the model’s predictions.”

As you can tell the paper is pretty jargony. In simple terms, the researchers recorded the brain activity of the mice staring at thousands of images and used that data to build a similar computational system that models that activity. To make sure the mice were looking at the image, they were “head-fixed” and put on a treadmill.

[…]

When the CNN was tasked with classifying a different set of images that were not presented to the mice, its accuracy was comparable to a ResNet-18 model that had not been regularized. But as the researchers began adding random noise to those images, the performance of the unregularized models dropped more drastically compared to the regularized version.

“We observed that the CNN model becomes more robust to random noise when neural regularization is used,” the paper said. In other words, the mice-hardened ResNet-18 model is less likely to be fooled by adversarial examples if it contains features that have been borrowed by real biological mouse brains.

The researchers believe that incorporating these “brain-like representations” into machine learning models could help them reach “human-like performance” one day. But although the results seem promising, the researchers have no idea how it really works.

“While our results indeed show the benefit of adopting more brain-like representation in visual processing, it is however unclear which aspects of neural representation make it work. We think that it is the most important question and we need to understand the principle behind it,” they concluded

Source: Boffins harnessed the brain power of mice to build AI models that can’t be fooled • The Register

White Screen of Death: Admins up in arms after experimental Google emission borks Chrome – yay auto updates

An experimental feature silently rolled out to the stable Chrome release on Tuesday caused chaos for IT admins this week after users complained of facing white, featureless tabs on Google’s massively popular browser.

The issue affected thousands of businesses’ terminal servers, with multiple users on the same server experiencing “white screen of death” at the same time.

Someone posting on the Chromium bug tracker mailing list described the problem as follows:

We have confirmed and replicated; when any user on a shared session citrix box locks their screen, all Chrome windows stop rendering (“White screen of death”) until ANYONE unlocks their screen, upon which, all Chrome windows resume rendering. This looks like random behaviour to the user but we have confirmed lock/unlock is the culprit.

The person added: “We have fixed this temporarily by starting chrome with –disable-backgrounding-occluded-windows,” applying the fix through a group policy object.

Google software engineer David Bienvenu jumped in to explain:

The experiment/flag has been on in beta for ~5 months. It was turned on for stable (e.g., m77, m78) via an experiment that was pushed to released Chrome Tuesday morning.

At 1824 UTC last night, Bienvenu rolled back the experiment change, noting “I’m not sure how long it takes to go live, but once it’s live, users will need to restart Chrome to get the change.”

Source: White Screen of Death: Admins up in arms after experimental Google emission borks Chrome • The Register

Germany forces Apple to allow use of iPhone’s NFC chip to other payment providers, breaks some little part of the monopoly

A new German law passed yesterday requires Apple to allow other mobile payments services access to the iPhone’s NFC chip for payments to allow them to fully compete with Apple Pay.

Apple initially completely locked down the NFC chip so that it could be used only by Apple Pay. It later allowed some third-party apps to use the chip but has always refused to do so for other mobile payment apps

Banks have been demanding access to the NFC chip for their own payment apps since 2016. Australia’s three biggest banks claimed that locking them out of the NFC chip was anti-competitive behavior.

National Australia Bank, Commonwealth Bank of Australia and Westpac Banking Corp all want the right to access the NFC chip in iPhones for their own mobile wallet apps.

Reuters reports that the law doesn’t name Apple specifically, but would apply to the tech giant. The piece somewhat confusingly refers to access to the NFC chip by third-party payment apps as Apple Pay.

A German parliamentary committee unexpectedly voted in a late-night session on Wednesday to force the tech giant to open up Apple Pay to rival providers in Germany.

This came in the form of an amendment to an anti-money laundering law that was adopted late on Thursday by the full parliament and is set to come into effect early next year.

The legislation, which did not name Apple specifically, will force operators of electronic money infrastructure to offer access to rivals for a reasonable fee.

Source: iPhone’s NFC chip should be open to other mobile wallet apps – 9to5Mac

Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information

A majority of Americans believe their online and offline activities are being tracked and monitored by companies and the government with some regularity. It is such a common condition of modern life that roughly six-in-ten U.S. adults say they do not think it is possible to go through daily life without having data collected about them by companies or the government.

[…]

large shares of U.S. adults are not convinced they benefit from this system of widespread data gathering. Some 81% of the public say that the potential risks they face because of data collection by companies outweigh the benefits, and 66% say the same about government data collection. At the same time, a majority of Americans report being concerned about the way their data is being used by companies (79%) or the government (64%). Most also feel they have little or no control over how these entities use their personal information,

[…]

Fully 97% of Americans say they are ever asked to approve privacy policies, yet only about one-in-five adults overall say they always (9%) or often (13%) read a company’s privacy policy before agreeing to it. Some 38% of all adults maintain they sometimes read such policies, but 36% say they never read a company’s privacy policy before agreeing to it.

[…]

Among adults who say they ever read privacy policies before agreeing to their terms and conditions, only a minority – 22% – say they read them all the way through before agreeing to their terms and conditions.

There is also a general lack of understanding about data privacy laws among the general public: 63% of Americans say they understand very little or nothing at all about the laws and regulations that are currently in place to protect their data privacy.

Source: Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information | Pew Research Center

Lessons from the cyberattack on India’s largest nuclear power plant – Bulletin of the Atomic Scientists

Indian officials acknowledged on October 30th that a cyberattack occurred at the country’s Kudankulam nuclear power plant. An Indian private cybersecurity researcher had tweeted about the breach three days earlier, prompting Indian authorities to initially deny that it had occurred before admitting that the intrusion had been discovered in early September and that efforts were underway to respond to it.

According to last Monday’s Washington Post, Kudankulam is India’s biggest nuclear power plant, “equipped with two Russian-designed and supplied VVER pressurized water reactors with a capacity of 1,000 megawatts each. Both reactor units feed India’s southern power grid. The plant is adding four more reactor units of the same capacity, making the Kudankulam Nuclear Power Plant one of the largest collaborations between India and Russia.”

While reactor operations at Kudankulam were reportedly unaffected, this incident should serve as yet another wake-up call that the nuclear power industry needs to take cybersecurity more seriously. There are worrying indications that it currently does not: A 2015 report by the British think tank Chatham House found pervasive shortcomings in the nuclear power industry’s approach to cybersecurity, from regulation to training to user behavior. In general, nuclear power plant operators have failed to broaden their cultures of safety and security to include an awareness of cyberthreats. (And by cultures of safety and security, those in the field—such as the Fissile Materials Working Group—refer to a broad, all-embracing approach towards nuclear security, that takes into account the human factor and encompasses programs on personnel reliability and training, illicit trafficking interception, customs and border security, export control, and IT security, to name just a few items. The Hague Communiqué of 2014 listed nuclear security culture as the first of its three pillars of nuclear security, the other two being physical protection and materials accounting.)

This laxness might be understandable if last week’s incident were the first of its kind. Instead, there have been over 20 known cyber incidents at nuclear facilities since 1990.

Source: Lessons from the cyberattack on India’s largest nuclear power plant – Bulletin of the Atomic Scientists

Ancestry Taps AI To Sift Through Millions of Obituaries

Algorithms identified death notices in old newspaper pages, then another set of algorithms pulled names and other key details into a searchable database. From a report: Ancestry used artificial intelligence to extract obituary details hidden in a half-billion digitized newspaper pages dating back to 1690, data invaluable for customers building their family trees. The family history and consumer-genomics company, based in Lehi, Utah, began the project in late 2017 and introduced the new functionality last month. Through its subsidiary Newspapers.com, the company had a trove of newspaper pages, including obituaries — but it said that manually finding and importing those death notices to Ancestry.com in a form that was usable for customers would likely have taken years. Instead, Ancestry tasked its 24-person data-science team with having technology pinpoint and make sense of the data. The team trained machine-learning algorithms to recognize obituary content in those 525 million newspaper pages. It then trained another set of algorithms to detect and index key facts from the obituaries, such as names of the deceased’s spouse and children, birth dates, birthplaces and more.

Ancestry, which has about 3.5 million subscribers, now offers about 262 million obituaries, up from roughly 40 million two years ago. Its database includes about a billion names associated with obituaries, including names of the deceased and their relatives. Besides analyzing the trove of old newspaper pages, the algorithms were also applied to online obituaries coming into Ancestry’s database, making them more searchable. Before the AI overhaul, the roughly 40 million obituaries on Ancestry.com were searchable only by the name of the deceased. That meant a search for “Mary R. Smith,” for instance, would yield obituaries only for people with that name — not other obituaries that mentioned that name as a sibling or child.

Source: Ancestry Taps AI To Sift Through Millions of Obituaries – Slashdot

Thousands of hacked Disney+ accounts are already for sale on hacking forums, technical problems, people driven to bittorrenting again.

Hackers didn’t waste any time and have started hijacking Disney+ user accounts hours after the service launched.

Many of these accounts are now being offered for free on hacking forums, or available for sale for prices varying from $3 to $11, a ZDNet investigation has discovered.

A stream of user complaints

The Disney+ video streaming service launched this week, on November 12. The service, although being available only in the US, Canada, and the Netherlands, has already amassed more than 10 million customers in its first 24 hours.

The Disney+ launch was marred by technical issues. Many users reported being unable to stream their favorite movies and shows.

But hidden in the flood of complaints about technical issues was a smaller stream of users reporting losing access to their accounts.

Many users reported that hackers were accessing their accounts, logging them out of all devices, and then changing the account’s email and password, effectively taking over the account and locking the previous owner out.

Source: Thousands of hacked Disney+ accounts are already for sale on hacking forums | ZDNet

Aside from traditional cable, which remains a must for any sports fan at the absolute least, there now exist more than a half-dozen prominent streaming services (and lots more small ones), all filled with a couple of buzzy shows, some old favorites, and endless filler crap that makes the library of content seem more valuable than it is. And if keeping up with the Emmy-nominated offerings of services like Netflix, Hulu, and Amazon Prime didn’t already feel like a financial strain, the launch of Apple TV+ and the fawned-over premiere of Disney+ might have done it.

By my count, if you want to watch shows on HBO, Apple TV+, Disney+, CBS All-Access, Amazon Prime, Hulu, and Netflix, it’d run you $60.93 a month or $731.16 a year, and that’s before factoring in a standard cable package for live events and other shows, or the other streaming services sure to launch in the near future. (NBC’s got one coming down the pike.)

[…]

Instead of letting viewers just pay for the stuff they watch, they’re forced, instead, to choose between equally flawed packages where the fun and/or high-quality shows get bundled with pointless crap that jacks up the price. Unlike Spotify and its clones, which include essentially all the music a person could want, one relatively cheap subscription to any Movie/TV streaming service doesn’t give you access to more-or-less the entire history of moving pictures. And unlike Spotify and its clones, which have caused a massive downturn in music piracy, the shows on all these platforms are ripe for stealing.

[…]

A simple glance at torrent websites shows that plenty of people are stealing from the brand new steaming services—episodes of The Mandalorian and Dickinson all have hundreds or thousands of seeders and are among the most popular shows on torrent sites. I reached out specifically to Disney, Apple, and Netflix to ask what their policy was on going after pirated content, and haven’t heard back, but it’s obvious that these companies assume that at least some of their viewers aren’t paying the full price for their services. Given that you can watch as many as six simultaneous streams with Apple TV+, and four with Disney+ and the top Netflix package, the more common form of piracy—password sharing—is built into the system.

Source: Disney + and ‘The Mandalorian’ Are Driving People Back to Torrenting