Criminal Law


Big Brother is watching: Chinese city with 2.6m cameras is world's most heavily surveilled

#artificialintelligence

Qiu Rui, a policeman in Chongqing, was on duty this summer when he received an alert from a facial recognition system at a local square. There was a high probability a man caught on camera was a suspect in a 2002 murder case, the system told him. The depth, breadth and intrusiveness of China's mass surveillance may be unprecedented in modern history The city's surveillance system scans facial features of people on the streets from frames of video footage in real time, creating a virtual map of the face. It can then match this information against scanned faces of suspects in a police database. If there is a match that passes a preset threshold, typically 60% or higher, the system immediately notifies officers.


Big Brother is watching: Chinese city with 2.6m cameras is world's most heavily surveilled

#artificialintelligence

Qiu Rui, a policeman in Chongqing, was on duty this summer when he received an alert from a facial recognition system at a local square. There was a high probability a man caught on camera was a suspect in a 2002 murder case, the system told him. The depth, breadth and intrusiveness of China's mass surveillance may be unprecedented in modern history The city's surveillance system scans facial features of people on the streets from frames of video footage in real time, creating a virtual map of the face. It can then match this information against scanned faces of suspects in a police database. If there is a match that passes a preset threshold, typically 60% or higher, the system immediately notifies officers.


Fortinet Predicts Advanced AI and Counter Threat Intelligence Will Evolve Shifting the Cybercriminal TimesTech

#artificialintelligence

Bangalore, India – November 25, 2019- Michael Joseph, Director System Engineering, India & SAARC, Fortinet "Much of the success of cyber adversaries has been due to the ability to take advantage of the expanding attack surface and the resulting security gaps due to digital transformation. Most recently, their attack methodologies have become more sophisticated by integrating the precursors of AI and swarm technology. Luckily, this trajectory is about to shift, if more organizations use the same sorts of strategies to defend their networks that criminals are using to target them. This requires a unified approach that is broad, integrated, and automated to enable protection and visibility across network segments as well as various edges, from IoT to dynamic-clouds." Fortinet, a global leader in broad, integrated, and automated cybersecurity solutions, today unveiled predictions from the FortiGuard Labs team about the threat landscape for 2020 and beyond.


Google's new 'Explainable AI" (xAI) service

#artificialintelligence

Artificial intelligence is set to transform global productivity, working patterns, and lifestyles and create enormous wealth. Research firm Gartner expects the global AI economy to increase from about $1.2 trillion last year to about $3.9 Trillion by 2022, while McKinsey sees it delivering global economic activity of around $13 trillion by 2030. AI techniques, especially Deep Learning (DL) models are revolutionizing the business and technology world with jaw-dropping performances in one application area after another -- image classification, object detection, object tracking, pose recognition, video analytics, synthetic picture generation -- just to name a few. They are being used in -- healthcare, I.T. services, finance, manufacturing, autonomous driving, video game playing, scientific discovery, and even the criminal justice system. However, they are like anything but classical Machine Learning (ML) algorithms/techniques.


Machine Learning and the Evaluation of Criminal Evidence Alicia Carriquiry WiDS 2019

#artificialintelligence

Alicia Carriquiry Distinguished Professor and President's Chair in Statistics Director of CSAFE, Iowa State University In the US criminal justice system, jurors choose between two competing hypothesis: the suspect is the source of the evidence found at the crime scene or s/he is not. The likelihood ratio framework, which relies on Bayes' theorem for assessing the probative value of evidence, is difficult to implement in practice, when evidence is in the form of an image. Machine learning provides a good alternative for determining whether the evidence supports the proposition that the suspect may have been its source. We illustrate these ideas using information about the surface topography of bullet lands.


AI and the law

#artificialintelligence

Artificial intelligence and automation are responsible for a growing number of decisions by pubic authorities in areas like criminal justice, security and policing and public administration, despite having proven flaws and biases. Facial recognition systems are entering public spaces without any clear accountability or oversight. Lawyers must play a greater role in ensuring the safety and accountability of advanced data and analytics technologies, says Karen Yeung at the University of Birmingham. The dream of artificial intelligence stretches back seven decades, to a seminal paper by Alan Turing. But only recently has AI been commercialized and industrialized at scale, weaving its way into every nook and cranny of our lives.


Could Artificial Intelligence End the War on Cybercrime?

#artificialintelligence

These programs are trained to recognize patterns that indicate that something is fishy with a particular email. These programs can analyze thousands of emails in seconds and quarantine those that look iffy. As they grow and learn more about the patterns in suspicious emails, they become even more effective. The same is true of the anti-virus software that protects all our data.


Machine learning advances new tool to fight cybercrime in the cloud

#artificialintelligence

WEST LAFAYETTE, Ind. – Increased adoption of cloud applications, such as Dropbox and Google Drive, by private users has increased concern about use of cloud information for cybercrimes such as child exploitation, illegal drug trafficking and illegal firearm transactions. Researchers at Purdue University have developed a cloud forensic model using machine learning to collect digital evidence related to illegal activities on cloud storage applications. "It is crucial to detect illegal cloud activities in motion," said Fahad Salamh, a PhD student in the Purdue Polytechnic Institute, who helped create the system. "Our technology identifies and analyzes in real time incidents related to these cybercrimes through transactions uploaded to cloud storage applications." Salamh worked on the technology with Marcus Rogers and Umit Karabiyik, professors in Polytechnic who specialize in computer and information technology.


Omdena Spell - Using AI to Combat Sexual Harassment

#artificialintelligence

At A Glance: Omdena and Spell collaborate with 30 global AI practitioners in a global challenge to harness the power of machine learning to pioneer new approaches to combatting sexual harassment. Sexual harassment is a severe and ongoing problem that plagues communities worldwide today. The issue particularly rampant in India, where thousands of harassment cases are reported each year. Policymakers have been working to create solutions, yet despite efforts to curb offenders and bring justice to victims, there has been little progress in shifting culture on a societal level, perpetuating a society where women must grapple with fear for their safety in public spaces. Recently, Safecity India, an award-winning NGO with the world's most comprehensive database on sexual harassment cases, hosted an Omdena challenge in effort to bring communities together and create an innovative product to fix the problem.


7 Ways AI Reduces Mobile Fraud Just In Time For The Holidays

#artificialintelligence

On average, there are 82 new rogue applications submitted per day to any given AppExchange or application platform, all designed to defraud consumers. Mobile and digital commerce are cybercriminals' favorite attack surfaces because they are succeeding with a broad base of strategies for defrauding people and businesses. Phishing, malware, smishing, or the use of SMS texts rather than email to launch phishing attempts are succeeding in gaining access to victims' account credentials, credit card numbers, and personal information to launch identity theft breaches. The RSA is seeing an arms race between cybercriminals and mobile OS providers with criminals improving their malware to stay at parity or leapfrog new versions and security patches of mobile operating systems. Creating a series of rogue applications and successfully uploading them into an AppExchange or application store gives cybercriminals immediate access to global markets.