A new study has found that thousands of Android apps are violating U.S. law by tracking and sharing the data of children.
Category: law – Page 74
Over 150 experts in AI, robotics, commerce, law, and ethics from 14 countries have signed an open letter denouncing the European Parliament’s proposal to grant personhood status to intelligent machines. The EU says the measure will make it easier to figure out who’s liable when robots screw up or go rogue, but critics say it’s too early to consider robots as persons—and that the law will let manufacturers off the liability hook.
This all started last year when the European Parliament proposed the creation of a specific legal status for robots:
so that at least the most sophisticated autonomous robots could be established as having the status of electronic persons responsible for making good any damage they may cause, and possibly applying electronic personality to cases where robots make autonomous decisions or otherwise interact with third parties independently.
The University of Nebraska College of Law is joining forces with space and military law experts from Australia and the United Kingdom to take the lead on understanding how our Earth-bound laws will be applied in times of armed conflict in outer space.
Some of the best legal and policy minds at the University of Adelaide, UNSW Canberra, University of Exeter and Nebraska Law will draft the definitive document on military and security law as applied to space.
The Woomera Manual on the International Law of Military Space Operations is to be completed in 2020. It will draw on the knowledge of dozens of legal and space operations experts from around the world.
“Be very, very afraid. As this extraordinary book reveals, we are fast sailing into an era in which big life-and-death decisions in war will be made not by men…and women, but by artificial intelligence” — @stavridisj’s review of @paul_scharre upcoming book Pre-order yours now:
A Pentagon defense expert and former U.S. Army Ranger explores what it would mean to give machines authority over the ultimate decision of life or death.
What happens when a Predator drone has as much autonomy as a Google car? Or when a weapon that can hunt its own targets is hacked? Although it sounds like science fiction, the technology already exists to create weapons that can attack targets without human input. Paul Scharre, a leading expert in emerging weapons technologies, draws on deep research and firsthand experience to explore how these next-generation weapons are changing warfare.
Scharre’s far-ranging investigation examines the emergence of autonomous weapons, the movement to ban them, and the legal and ethical issues surrounding their use. He spotlights artificial intelligence in military technology, spanning decades of innovation from German noise-seeking Wren torpedoes in World War II―antecedents of today’s homing missiles―to autonomous cyber weapons, submarine-hunting robot ships, and robot tank armies. Through interviews with defense experts, ethicists, psychologists, and activists, Scharre surveys what challenges might face “centaur warfighters” on future battlefields, which will combine human and machine cognition. We’ve made tremendous technological progress in the past few decades, but we have also glimpsed the terrifying mishaps that can result from complex automated systems―such as when advanced F-22 fighter jets experienced a computer meltdown the first time they flew over the International Date Line.
Getting your head around cryptocurrencies was hard enough before governments got involved. But now that policy makers around the world are drawing up fresh regulations on everything from exchanges to initial coin offerings, keeping track of what’s legal has become just as daunting as figuring out which newfangled token might turn into the next Bitcoin.
The rules can vary wildly by country, given a lack of global coordination among authorities. And while that may change after finance chiefs discuss digital assets at the Group of 20 meeting in Buenos Aires this week, for the time being there’s a wide range of opinions on how best to regulate the space. Below is a rundown of what major countries are doing now.
Legacy Method of Inheriting Assets
Many Bitcoin owners choose to use a custodial account, in which the private keys to a wallet are generated and controlled by their exchange—or even a bank or stock broker. In this case, funds are passed to heirs in the usual way. It works like this…
An executor, probate attorney, or someone with a legal claim contacts the organization that controls the assets. They present a death certificate, medical proxy or power-of-attorney. Just as with your bank account or stocks and bonds, you have the option of listing next of kin and the proportion of your assets that should be distributed to each. These custodial services routinely ask you to list individuals younger than you and alternate heirs, along with their street addresses, in the event that someone you list has died before you.
Of course, Bitcoin purists and Libertarians point out that the legacy method contradicts the whole point of owning a cryptocurrency. Fair enough.
Multisig to the Rescue
Using multisig would be far easier, if wallet vendors would conform to standards for compatibility and embed technology into hardware and software products. Unfortunately, they have been slow to do so, and there are not yet widely recognized standards to assure users that an implementation is both effective and secure. But, there is some good news: It’s fairly easy to process your ordinary account passwords and even the security questions with a roll-your-own multisig process. I’ve done it using PGP and also using Veracrypt—two widely recognized, open source encryption platforms.
This short article is not intended as an implementation tutorial, but if the wallet vendors don’t jump up to home plate, I may release a commercial tool for users to more easily add multisig to their wallets. It really is safe, simple and effective. (If readers wish to partner with me on this? I estimate that it will take $260,000 and about six months).
What is Multisig and How Does it Protect your Wealth?
Multisig allows anyone with credentials to an account, wallet or even a locked safe to create their own set of rules concerning which combinations of friends and relatives can access their assets without the original owner. The owner sets conditions concerning who, when, how much and which accounts can be accessed — and the heirs simply offer passwords or proof of identity. If implemented properly, it doesn’t matter if some of the heirs have forgotten passwords or died before the original owner.
This can be illustrated in an example. I am intentionally describing a complex scenario, so that you consider a full-blown implementation. Although the ‘rules’ listed below appear to be complex, the process for creating the associated passwords is trivial.
The last 2 rules listed below do not use Multisig technology, but rather Smart Contracts. It enhances an owner’s ability to dictate terms. Here, then, is the scenario…
I want heirs to have access to my assets
at banks, brokers, exchanges or other ac–
counts–but only under certain conditions:
- If any 4 of 11 trusted family and friends come together and combine their passwords (or an alternate proof-of-identity), they may access my wealth and transfer it to other accounts
- But, if one is my husband, Fred, or my daughter, Sue, then only two trusted individuals are needed
- —But not Fred and Sue together (At least one must be an outsider)
- If any account has less than $2500, then it goes to my favorite charity, rather than the individuals I have listed
- None of my accounts can be unlocked by my heirs, until I have not accessed them with my own password for 3 months. Prior to that, the Multisig will fail to gain access.
Again, the decedent’s wishes are complex, but executing and enforcing these rules is trivial. In my presentations, I describe the method on two simple PowerPoint slides. Even that short description is sufficient to show anyone who has used common cryptography apps to weave their own multisig add-on.
Of course, each individual will need to locate their own secret password, but a biometric or other conforming proof-of-identity can be substituted. Even if several survivors cannot recall their credentials, the multisig method allows other combinations of individuals to access the assets across all accounts.
This article may leave you wondering about the legal process—and this is where I agree with the Libertarian viewpoint: Sure! The courts have a process and heirs should document their access and decisions for tax purposes and to assure each other of fair play. But a key benefit of cryptocurrency and the disintermediation offered by the blockchain is the personal empowerment of access with impunity and without waiting for any legal process.
Let the courts to what they do, while you honor the wishes of your dearly departed.
If this article generates sufficient interest, I may prepare a short tutorial on how to split off your own Multisig passwords, regardless of which wallet or hosted services you use. It will work with any vendor, app or gadget —or— Perhaps, I will refine my homespun solution and offer it as an add-on app that can be used with any wallet, bank account or exchange. Simple, ubiquitous and effective multisig should have been available to even traditional banking customers years ago!
Philip Raymond co-chairs CRYPSA, hosts the New York Bitcoin Event and presents at
Crypto Conferences around the world. Book a presentation or consulting engagement.
AI vs. Lawyers
Posted in business, law, robotics/AI
Another milestone in the race to artificial superintelligence:
A study conducted by legal AI platform LawGeex in consultation with law professors from Stanford University, Duke University School of Law, and University of Southern California, pitted twenty experienced lawyers against an AI trained to evaluate legal contracts. Their 40 page report details how AI has overtaken top lawyers for the first time in accurately spotting risks in everyday business contracts.
Competitors were given four hours to review five non-disclosure agreements (NDAs) and identify 30 legal issues, including arbitration, confidentiality of relationship, and indemnification. They were scored by how accurately they identified each issue.
Meow-Ludo Disco Gamma Meow-Meow couldn’t just toss away his New South Wales transit pass even after he found out that it got deactivated while he was on a trip to the USee, Meow-Meow (yes, that is his legal name) cut the chip out of the travel card, encased it in biocompatible plastic and had it implanted under the skin on his left hand. The biohacker now plans to file a lawsuit against New South Wales’ transport authorities, not just to fight the decision, but also to help create laws around body-hacking tech. In addition to the transit pass chip, Meow-Meow has two other implanted elect…
Science’s pirate queen
Posted in computing, law, neuroscience, open access, science
These campaigns could erode the base of the Legal Open Access movement: scientists’ awareness of their options for sharing research. Elbakyan, on the other hand, would be left unaffected. The legal campaigns against Sci-Hub have — through the Streisand effect — made the site more well-known than most mainstay repositories, and Elbakyan more famous than legal Open Access champions like Suber.
The threat posed by ACS’s injunction against Sci-Hub has increased support for the site from web activists organizations such as the EFF, which considesr the site “a symptom of a serious problem: people who can’t afford expensive journal subscriptions, and who don’t have institutional access to academic databases, are unable to use cutting-edge scientific research.”
In cramped quarters at Russia’s Higher School of Economics, shared by four students and a cat, sat a server with 13 hard drives. The server hosted Sci-Hub, a website with over 64 million academic papers available for free to anybody in the world. It was the reason that, one day in June 2015, Alexandra Elbakyan, the student and programmer with a futurist streak and a love for neuroscience blogs, opened her email to a message from the world’s largest publisher: “YOU HAVE BEEN SUED.”
It wasn’t long before an administrator at Library Genesis, another pirate repository named in the lawsuit, emailed her about the announcement. “I remember when the administrator at LibGen sent me this news and said something like ‘Well, that’s… that’s a real problem.’ There’s no literal translation,” Elbakyan tells me in Russian. “It’s basically ‘That’s an ass.’ But it doesn’t translate perfectly into English. It’s more like ‘That’s fucked up. We’re fucked.’”.