Tesla workers shared and memed sensitive images recorded by customer cars

Private camera recordings, captured by cars, were shared in chat rooms: ex-workers
Circulated clips included one of child being hit by car: ex-employees
Tesla says recordings made by vehicle cameras ‘remain anonymous’
One video showed submersible vehicle from James Bond film, owned by Elon Musk


LONDON/SAN FRANCISCO, April 6 (Reuters) – Tesla Inc assures its millions of electric car owners that their privacy “is and will always be enormously important to us.” The cameras it builds into vehicles to assist driving, it notes on its website, are “designed from the ground up to protect your privacy.”

But between 2019 and 2022, groups of Tesla employees privately shared via an internal messaging system sometimes highly invasive videos and images recorded by customers’ car cameras, according to interviews by Reuters with nine former employees.

Some of the recordings caught Tesla customers in embarrassing situations. One ex-employee described a video of a man approaching a vehicle completely naked.

Also shared: crashes and road-rage incidents. One crash video in 2021 showed a Tesla driving at high speed in a residential area hitting a child riding a bike, according to another ex-employee. The child flew in one direction, the bike in another. The video spread around a Tesla office in San Mateo, California, via private one-on-one chats, “like wildfire,” the ex-employee said.

Other images were more mundane, such as pictures of dogs and funny road signs that employees made into memes by embellishing them with amusing captions or commentary, before posting them in private group chats. While some postings were only shared between two employees, others could be seen by scores of them, according to several ex-employees.

Tesla states in its online “Customer Privacy Notice” that its “camera recordings remain anonymous and are not linked to you or your vehicle.” But seven former employees told Reuters the computer program they used at work could show the location of recordings – which potentially could reveal where a Tesla owner lived.

One ex-employee also said that some recordings appeared to have been made when cars were parked and turned off. Several years ago, Tesla would receive video recordings from its vehicles even when they were off, if owners gave consent. It has since stopped doing so.

“We could see inside people’s garages and their private properties,” said another former employee. “Let’s say that a Tesla customer had something in their garage that was distinctive, you know, people would post those kinds of things.”

Tesla didn’t respond to detailed questions sent to the company for this report.

About three years ago, some employees stumbled upon and shared a video of a unique submersible vehicle parked inside a garage, according to two people who viewed it. Nicknamed “Wet Nellie,” the white Lotus Esprit sub had been featured in the 1977 James Bond film, “The Spy Who Loved Me.”

The vehicle’s owner: Tesla Chief Executive Elon Musk, who had bought it for about $968,000 at an auction in 2013. It is not clear whether Musk was aware of the video or that it had been shared.

The submersible Lotus vehicle nicknamed “Wet Nellie” that featured in the 1977 James Bond film, “The Spy Who Loved Me,” and which Tesla chief executive Elon Musk purchased in 2013. Tim Scott ©2013 Courtesy of RM Sotheby’s
The submersible Lotus vehicle nicknamed “Wet Nellie” that featured in the 1977 James Bond film, “The Spy Who Loved Me,” and which Tesla chief executive Elon Musk purchased in 2013. Tim Scott ©2013 Courtesy of RM Sotheby’s
Musk didn’t respond to a request for comment.

To report this story, Reuters contacted more than 300 former Tesla employees who had worked at the company over the past nine years and were involved in developing its self-driving system. More than a dozen agreed to answer questions, all speaking on condition of anonymity.

Reuters wasn’t able to obtain any of the shared videos or images, which ex-employees said they hadn’t kept. The news agency also wasn’t able to determine if the practice of sharing recordings, which occurred within some parts of Tesla as recently as last year, continues today or how widespread it was. Some former employees contacted said the only sharing they observed was for legitimate work purposes, such as seeking assistance from colleagues or supervisors.

https://www.reuters.com/technology/tesla-workers-shared-sensitive-images-recorded-by-customer-cars-2023-04-06/

Navy Carrier-Based Drones Will Be Able To Be Controlled By The Air Force

In a future fight, control of advanced drones belonging to the U.S. Navy and U.S. Air Force could be passed back and forth between assets from either service as the situation demands. Uncrewed platforms are set to make up the majority of the Navy’s future carrier air wings, with up to 60 percent of all aircraft on each flattop eventually being pilotless.

Navy Rear Adm. Andrew “Bucket” Loiselle provided details on the service’s advanced aviation plans, including new drones and sixth-generation crewed stealth combat jets, and cooperation with the Air Force on these efforts during a panel discussion yesterday at the Navy League’s annual Sea-Air-Space conference and exhibition. These efforts are part of the service’s broader Next Generation Air Dominance (NGAD) program that you can learn about here. Loiselle is currently the director of the Air Warfare Division, also referred to as N98, within the Office of the Chief of Naval Operations.

[…]

n a future fight, control of advanced drones belonging to the U.S. Navy and U.S. Air Force could be passed back and forth between assets from either service as the situation demands. Uncrewed platforms are set to make up the majority of the Navy’s future carrier air wings, with up to 60 percent of all aircraft on each flattop eventually being pilotless.

Navy Rear Adm. Andrew “Bucket” Loiselle provided details on the service’s advanced aviation plans, including new drones and sixth-generation crewed stealth combat jets, and cooperation with the Air Force on these efforts during a panel discussion yesterday at the Navy League’s annual Sea-Air-Space conference and exhibition. These efforts are part of the service’s broader Next Generation Air Dominance (NGAD) program that you can learn about here. Loiselle is currently the director of the Air Warfare Division, also referred to as N98, within the Office of the Chief of Naval Operations.


  1. The War Zone

Navy Carrier-Based Drones Will Be Able To Be Controlled By The Air Force

The future carrier air wings will be 60% unmanned and there is now “unbelievable cooperation” with the Air Force on making that happen.

BYJOSEPH TREVITHICK|PUBLISHED APR 5, 2023 1:01 PM EDT

THE WAR ZONE

Navy Carrier-Based Drones Will Be Able To Be Controlled By The Air Force
Boeing

SHARE

JOSEPH TREVITHICKView Joseph Trevithick’s Articles

FranticGoat

In a future fight, control of advanced drones belonging to the U.S. Navy and U.S. Air Force could be passed back and forth between assets from either service as the situation demands. Uncrewed platforms are set to make up the majority of the Navy’s future carrier air wings, with up to 60 percent of all aircraft on each flattop eventually being pilotless.

Navy Rear Adm. Andrew “Bucket” Loiselle provided details on the service’s advanced aviation plans, including new drones and sixth-generation crewed stealth combat jets, and cooperation with the Air Force on these efforts during a panel discussion yesterday at the Navy League’s annual Sea-Air-Space conference and exhibition. These efforts are part of the service’s broader Next Generation Air Dominance (NGAD) program that you can learn about here. Loiselle is currently the director of the Air Warfare Division, also referred to as N98, within the Office of the Chief of Naval Operations.

null

null

“As we looked upon that air wing of the future, we have numerous unmanned systems,” Loiselle said. “You’ve heard talk about CCAs [and] MQ-25.”

The MQ-25 Stingray is an uncrewed tanker aircraft with a secondary intelligence, surveillance, and reconnaissance (ISR) capability that the Navy has been developing for years.

https://youtube.com/watch?v=q2uGkF2J1Y0%3Ffeature%3Doembed%26rel%3D0%26enablejsapi%3D1

null

CCA stands for Collaborative Combat Aircraft and is a term that originated with the Air Force to describe future advanced drones with high degrees of autonomy intended to operate collaboratively with crewed platforms. Secretary of the Air Force Frank Kendall announced earlier this year that the service had begun doing future planning around a fleet of at least 1,000 CCAs, as well as 200 crewed sixth-generation stealth combat jets, all being developed as part of its own separate multi-faceted NGAD program. The CCA figure was based on a notional concept of operations that would pair two of the drones with each of the 200 NGAD combat jets and 300 stealthy F-35A Joint Strike Fighters.

However, the Air Force is still very much refining its CCA fleet structure plans, which could grow to include an even larger total number of CCAs with different types geared toward different mission sets. It’s also still figuring out how it intends to deploy and employ them. The Navy appears to be doing much the same, in increasingly close coordination with the Air Force.

“We’re developing an unmanned control station that’s already installed on three aircraft carriers, and that will be the control station for any UAS [uncrewed aerial systems] that we buy,” Rear Adm. Loiselle added. “[There is] unbelievable cooperation with the Air Force right now in the development of mission systems for both sixth-gen [combat jets] and CCAs… I’m very close to getting a signed agreement with the Air Force where we’re going to have the ability for the Navy to control Air Force CCAs and the Air Force to control Navy CCAs.”

The drone control system in question is the MD-5 Unmanned Carrier Aviation Mission Control System (UMCS), the development of which began adjacent to the Navy’s abortive Unmanned Carrier-Launched Airborne Surveillance and Strike (UCLASS) program. The installation of the UMCS on Navy carriers has also prompted the creation of a new Unmanned Aviation Warfare Center (UAWC) on those ships.

null

The Navy has previously said that the MQ-25 would be deployed first on the Nimitz class carriers USS Dwight D. Eisenhower and USS George H.W. Bush, and the latter ship has been actively used for testing that drone. It was announced last year that the plans had changed and that USS Theodore Roosevelt, another Nimitz class ship, would be the first to host the Stingray.

https://youtube.com/watch?v=WFrzKILwfFg%3Ffeature%3Doembed%26rel%3D0%26enablejsapi%3D1

The expectation is that future CCAs will also be able to be controlled by various aircraft in the course of operations. The Navy has specifically said in the past that one of the core missions for its future sixth-generation crewed combat jet, also referred to as F/A-XX, will be acting as a “quarterback” for drones.

For the Navy and the Air Force, being able to readily exchange control of future drones will be key to ensuring operational flexibility. During the panel discussion yesterday, Rear Adm. Loiselle outlined a broader future naval vision where this capability could be particularly valuable.

[…]

“The bottom line is when we’re building our future force that’s going to be 60 percent unmanned, then we’re going to look different than we do today. And we are no longer going to have a fighting force that has 44 strike fighters on the deck, because that’s incompatible with a 60 percent unmanned air wing,” the rear admiral explained. “So we’re going to have to change the narrative, from 44 strike fighters to how many targets can I get at what range at what time intervals, because that’s the true metric that matters.”

“The type of platform that delivers that ordnance is less important than the ability to do so,” he continued. “So we need to look at the entire portfolio that is present within the carrier strike group and how we generate that effect. Equally, we need to be cognizant of what’s available in the joint force, such that we don’t duplicate capabilities that would work within our part of that plan execution.”

[…]

With all this in mind, carrier strike groups, as well as potentially other naval assets, being able to readily take control of Air Force drones during operations in certain circumstances, and vice versa, could be extremely useful. A Navy carrier air wing or Air Force elements in the same region might be able to provide more on-demand escorts or other support for each other’s crewed platforms, including tactical combat jets and larger aircraft like bombers, tankers, and airlifters. Current and future Air Force assets capable of flying very long distances themselves, such as the forthcoming B-21 Raider stealth bomber, could even take control of Navy uncrewed aircraft using more localized line-of-sight links to help with their immediate missions, too.

null

For instance, long-range Air Force platforms like the B-21 could ‘pick up’ CCAs launched from a carrier operating far forward of any land base. They would then fly their mission into contested airspace with the help of their unmanned wingmen, then return them back to Navy control once they head back out of the high-threat area and towards the carrier’s area of operation. Unmanned tactical aircraft have a significant range advantage over their manned counterparts, which is a factor as well.

B-21 Raider

Beyond this, just being able to share fleets when in the air between the services opens up huge possibilities and operational synergies.

[…]

https://www.thedrive.com/the-war-zone/navy-carrier-based-drones-will-be-able-to-be-controlled-by-the-air-force

Cardboard drones running open source software take flight

An Australian engineering company has created a cardboard drone that runs on open source software, standard hardware, and can be assembled and flown with no prior experience.

The Corvo Precision Payload Delivery System (PPDS) costs less than $3,500 apiece, a price made possible by the craft’s use of FOSS and commercial-off-the-shelf hardware.

Michael Partridge, SYPAQ’s general manager for Innovation & Strategic Programs (I&SP), told The Register that Corvo uses ArduPilot autopilot software, unspecified hardware that SYPAQ customizes, and waxed cardboard.


The drone takes around an hour to assemble, we’re told, and its lithium-ion batteries give it a range of up to 100km (62 miles) with a 3kg (6.6lb) payload.

The craft ships in a flat pack complete with tape, glue, and instructions on how to assemble it. A tablet computer is also included so users can tell Corvo where to fly by entering GPS coordinates. A wired connection to upload that flight plan is required, but once Corvo is aloft, it will proceed along its route, at a specified altitude, and land itself at its determined destination.

Partridge declined to discuss details of the tech on board the drones for operational reasons but said SYPAQ has ensured that flight plans are encrypted so that if a Corvo is captured, the location of its pilots can’t be retrieved.


SYPAQ will happily ship a single Corvo, but also offers a “capability pack” that includes multiple craft, spares, and the slingshot-powered launch ramp the craft needs to get airborne.

Partridge said single Corvo units have survived more than 20 flights and that the waxed cardboard wing can handle moisture well, without losing its aerodynamic qualities.

Users in the Ukrainian armed forces have adapted the craft to different roles too. Partridge said adding a camera requires some light hacking – of the drone’s cardboard airframe.

“It has a cargo bay [and] you can do whatever you want in there within the 3kg payload. You can cut a hole through the aircraft to look through it and insert a camera.”

For now, SYPAQ hasn’t given Corvo’s onboard computer wireless capabilities, partly to reduce cost and partly to ensure stealth. But Partridge said Corvos have carried action cameras like the GoPro and users are happy to retrieve removable media once the plane lands. SYPAQ is working on payloads that allow wireless transmission of images, possibly over long distances.

https://www.theregister.com/2023/04/07/corvo_cardboard_drone/

Study shows Tigers have distinct personalities

[…] The behavior of the 248 Siberian tigers observed through a test showed that the endangered cats had unique traits influencing both their success in reproduction and survival, researchers reported in the journal Royal Society Open Science.

“We found that tigers are very individual, and that people who’ve worked with them and know them well see their individual personalities,” co-author Rosalind Arden of the London School of Economics told AFP.

The study adapted a commonly used human to explore tiger traits such as confidence, sincerity, bullying and savagery in two separate populations of tigers held in semi-captivity in China.

Questionnaires with a list of 70 personality indicators were filled out by veterinarians and feeders who work with the tigers on a daily basis.

The combined results found that both displayed characteristics that fell into two overarching personality categories: majesty and steadiness.

Tigers scoring higher for “majesty” were healthier, preyed more on , and ate and mated more.

They were also “regarded by their human raters as having higher group status among tigers,” the study said.

But being collaborative and gentler had its evolutionary benefits too: “steady” tigers were shown to be gentler, more sincere and more loving.

Such traits may play a role in the unusual length of time—two to three years—that tiger cubs remain with their mothers.

The study found very few sex-related differences in tigers’ personalities, however, and father tigers have also been observed taking part in raising their young.

“It’s pleasant to see that you don’t have to be dominant, fierce, competitive and aggressive in order to succeed as a tiger,” said Arden.

Similar studies illuminating the personality and mental abilities of primates have helped humanize them, Arden said.

“There is evidence that it does, in fact, improve and conservation,” she added.

Siberian are endangered due to poaching and habitat loss. Only around 500 remain living in the wild.

More information: Rosalind Arden et al, Majestic tigers: personality structure in the great Amur cat, Royal Society Open Science (2023). DOI: 10.1098/rsos.220957

Source: Easy, tiger: study maps big cats’ personalities

Bio-inspired Nanocomposite Membranes for Osmotic Energy Harvesting: Joule

Context & Scale

Osmotic energy is a renewable energy with zero emissions and minimal daily variations. However, the membranes for osmotic energy harvesting must have multiple properties that are thought to be impossible to realize to make this technology viable. Here, we show that cartilage-inspired cation-selective composite membrane assembled from aramid nanofibers and boron nitride nanosheets make it possible by a layer-by-layer assembly technology. The osmotic energy can be harvested by both salt concentration gradient and pressure-driven streaming because of the high mechanical and transport characteristics of the membranes. The combination of high strength, toughness, chemical resilience, rapid ion transport, and structural versatility of aramid-boron nitride composites makes it a promising candidate for osmotic energy harvesting under realistic operational conditions and life-cycle requirements.

Summary

Osmotic energy represents a widespread and reliable source of renewable energy with minimal daily variability. The key technological bottleneck for osmotic electricity is that membranes must combine highly efficient ion rectification and high ionic flux with long-term robustness in seawater. Here, we show that nanocomposite membranes with structural organization inspired by soft biological tissues with high mechanical and transport characteristics can address these problems. The layered membranes engineered with molecular-scale precision from aramid nanofibers and BN nanosheets simultaneously display high stiffness and tensile strength even when exposed to repeated pressure drops and salinity gradients. The total generated power density over large areas exceeded 0.6 W m−2 and was retained for as long as 20 cycles (200 h), demonstrating exceptional robustness. Furthermore, the membranes showed high performance in osmotic energy harvesting in unprecedentedly wide ranges of temperature (0°C–95°C) and pH (2.8–10.8) essential for the economic viability of osmotic energy generators.
[…]

Source: Bio-inspired Nanocomposite Membranes for Osmotic Energy Harvesting: Joule

Double-slit experiment done using time instead of space

The experiment relies on materials that can change their optical properties in fractions of a second, which could be used in new technologies or to explore fundamental questions in physics.

The original double-slit experiment, performed in 1801 by Thomas Young at the Royal Institution, showed that light acts as a wave. Further experiments, however, showed that light actually behaves as both a wave and as particles – revealing its quantum nature.

These experiments had a profound impact on quantum physics, revealing the dual particle and wave nature of not just light, but other ‘particles’ including electrons, neutrons, and whole atoms.

Now, a team led by Imperial College London physicists has performed the experiment using ‘slits’ in time rather than space. They achieved this by firing light through a material that changes its properties in femtoseconds (quadrillionths of a second), only allowing light to pass through at specific times in quick succession.

Lead researcher Professor Riccardo Sapienza, from the Department of Physics at Imperial, said: “Our experiment reveals more about the fundamental nature of light while serving as a stepping-stone to creating the ultimate materials that can minutely control light in both space and time.”

Details of the experiment are published today in Nature Physics.

[…]

The material the team used was a thin film of indium-tin-oxide, which forms most mobile phone screens. The material had its reflectance changed by lasers on ultrafast timescales, creating the ‘slits’ for light. The material responded much quicker than the team expected to the laser control, varying its reflectivity in a few femtoseconds.

The material is a metamaterial – one that is engineered to have properties not found in nature. Such fine control of light is one of the promises of metamaterials, and when coupled with spatial control, could create new technologies and even analogues for studying fundamental physics phenomena like black holes.

Co-author Professor Sir John Pendry said: “The double time slits experiment opens the door to a whole new spectroscopy capable of resolving the temporal structure of a light pulse on the scale of one period of the radiation.”

The team next want to explore the phenomenon in a ‘time crystal’, which is analogous to an atomic crystal, but where the optical properties vary in time.

Co-author Professor Stefan Maier said: “The concept of time crystals has the potential to lead to ultrafast, parallelized optical switches.”

Source: Double-slit experiment that proved the wave n | EurekAlert!

ICE Is Grabbing Data From Schools, Abortion Clinics and news orgs with no judicial oversight

US Immigration and Customs Enforcement agents are using an obscure legal tool to demand data from elementary schools, news organizations, and abortion clinics in ways that, some experts say, may be illegal.

While these administrative subpoenas, known as 1509 custom summonses, are meant to be used only in criminal investigations about illegal imports or unpaid customs duties, WIRED found that the agency has deployed them to seek records that seemingly have little or nothing to do with customs violations, according to legal experts and several recipients of the 1509 summonses.

A WIRED analysis of an Immigration and Customs Enforcement (ICE) subpoena tracking database, obtained through a Freedom of Information Act request, found that agents issued custom summons more than 170,000 times from the beginning of 2016 through mid-August 2022. The primary recipients of 1509s include telecommunications companies, major tech firms, money transfer services, airlines, and even utility companies. But it’s the edge cases that have drawn the most concern among legal experts,

The outlier cases include custom summonses that sought records from a youth soccer league in Texas; surveillance video from a major abortion provider in Illinois; student records from an elementary school in Georgia; health records from a major state university’s student health services; data from three boards of elections or election departments; and data from a Lutheran organization that provides refugees with humanitarian and housing support.

In at least two instances, agents at ICE used the custom summons to pressure news organizations to reveal information about their sources.

All of this is done without judicial oversight.

[…]

The 1509 customs summons is an administrative subpoena explicitly and exclusively meant for use in investigations of illegal imports or unpaid customs duties under a law known as Title 19 US Code 1509. Its goal is to provide agencies like ICE with a way to obtain business records from companies without having to go to a judge for a warrant.

[…]

Without access to the underlying subpoenas ICE issued in each use of a 1509, it’s difficult to know exactly why companies in the database were issued customs summonses. However, nearly everyone we spoke to was concerned about the types of organizations that received these summonses. Our investigation found that ICE issued scores of customs summonses to hospitals and hundreds to elementary schools, high schools, and universities. “It’s disturbing,” Mao says. “I really can’t imagine how a student or a health record could possibly be relevant to a permissible customs investigation under the law.”

To figure out if these summonses were issued for customs investigations, we contacted 30 organizations that received them. Most did not respond, and many who did refused to speak on the record for fear of retaliation.

[…]

In March last year, US senator Ron Wyden, an Oregon Democrat who chairs the Senate Finance Committee, revealed that ICE had been using 1509 customs summonses to obtain millions of money transfer records, which were added to a database that was shared with hundreds of law enforcement agencies across the country. According to the American Civil Liberties Union (ACLU), it was one of the largest government surveillance programs in recent memory.

Immediately after Wyden’s investigation, the number of customs summons issued by ICE fell from 3,683 in March 2022 to 1,650 by the end of August, according to the records WIRED obtained.

[…]

 

Source: ICE Is Grabbing Data From Schools and Abortion Clinics | WIRED

Astronomers discover Saturns rings raining down, causing heat in atmosphere. New way to detect ring systems.

[…]

Some of the data was mistaken as noise when first collected up to 40 years ago, and researchers failed to recognize its significance until now. “When everything was calibrated, we saw clearly that the spectra are consistent across all the missions,” announced Lotfi Ben-Jaffel, lead author of the new research published in Planetary Science Journal on Thursday, and a researcher at the Institute of Astrophysics in Paris and the Lunar & Planetary Laboratory, University of Arizona, in a statement.

“This was possible because we have the same reference point, from Hubble, on the rate of transfer of energy from the atmosphere as measured over decades. It was really a surprise for me. I just plotted the different light distribution data together, and then I realized, wow – it’s the same.”

The researchers traced the increased levels of Lyman-alpha UV radiation to Saturn’s atmosphere, and concluded some external process must be exciting the hydrogen atoms. The most plausible explanation is that the icy particles in Saturn’s rings are crashing down onto Saturn’s atmosphere, causing it to heat up.

These bits and pieces get dislodged by colliding with micrometeorites, or by solar wind particle bombardment, solar ultraviolet radiation, or electromagnetic forces picking up electrically charged dust. Once they are knocked out of place, Saturn’s gravity pulls them in.

“Though the slow disintegration of the rings is well known, its influence on the atomic hydrogen of the planet is a surprise,” Ben-Jaffel said. “From the Cassini probe, we already knew about the rings’ influence. However, we knew nothing about the atomic hydrogen content.”

“Everything is driven by ring particles cascading into the atmosphere at specific latitudes. They modify the upper atmosphere, changing the composition. And then you also have collisional processes with atmospheric gases that are probably heating the atmosphere at a specific altitude,” he explained.

The team believe this phenomenon could provide astronomers with a new way to look for ring systems on exoplanets. If a spacecraft detects similar excess UV radiation bands in the upper atmosphere of a faraway planet, it could mean it might be supporting a ring system like Saturn’s.

[…]

Source: Astronomers discover never-before-seen phenomenon on Saturn • The Register

Cruz, Warren Intro America Act to Break Up huge advertisers

[…]

The Advertising Middlemen Endangering Rigorous Internet Competition Accountability Act, aka the AMERICA Act. Say what you will about government; Congress’ acronym acumen is untouchable. Introduced by Republican Sen. Mike Lee of Utah, the bill would prohibit companies from owning multiple parts of the digital ad ecosystem if they “process more than $20 billion in digital ad transactions.”

The bill would kneecap Google and Meta, the two biggest players in digital advertising by far, but its provisions seem designed to affect almost every big tech company from Apple to Amazon, too. Google, Meta, Amazon, and Apple did not respond to requests for comment.

The only thing longer than the name of the bill is the stunningly bipartisan list of Senators supporting it: Democrats Amy Klobuchar, Richard Blumenthal, and Elizabeth Warren, and Republicans Ted Cruz, Marco Rubio, Eric Schmitt, Josh Hawley, John Kennedy, Lindsey Graham, J.D. Vance, and Lee. As one observer put it on Twitter, it’s a list of cosponsors “who wouldn’t hold the elevator for each other.” Look at all these little Senators getting along. Isn’t that nice?

[…]

“If enacted into law, this bill would most likely require Google and Facebook to divest significant portions of their advertising businesses—business units that account for or facilitate a large portion of their ad revenue,” Sen. Lee said in a fact sheet about the bill. “Amazon may also have to make divestments, and the bill will impact Apple’s accelerating entry into third-party ads.”

[…]

When you see an ad online, it’s usually the result of a lightspeed bidding war. On one side, the demand side, you have companies who want to buy ads. On the other, the supply side, are apps and websites who have ad space to sell. Advertisers use demand-side tech to compete for the most profitable ad space for their products. Publishers, like Gizmodo.com, use supply-side tech, where they compete to sell the most profitable ads. Sometimes there’s a third piece of tech involved called an “exchange,” which is a service that connects demand-side platforms and supply-side platforms to arrange even more complicated auctions.

Your friends at Google operate the most popular demand-side platform. Google also owns the most popular supply-side platform, and it runs the most popular exchange. And Google is also a publisher, because it sells ad space on places like YouTube and Search. Meta likewise has its hands in multiple corners of the pie. Here’s an analogy: it’s like if the realtor you contracted to represent you in buying a house had also been contracted by the people selling the house. It would be hard to trust that anyone was getting a fair deal, wouldn’t it? That realtor would be in a unique position to jack up the prices for everyone and make extra cash. The dominance is quantifiable—Google itself estimates that it snatches a stunning 35% of every dollar spent on digital ads.

Some people think this is all a little unfair! Unfortunately for Google and Meta, more and more of those people work for the US government.

[…]

Source: Cruz, Warren Intro America Act to Break Up Google, Facebook

This only targets a specific part of the monopolies  / duopolies these companies hold, but it’s hugely bipartisan so we take what we can get.

Researchers synthesize graphene using intense light

DGIST Professor Yoonkyu Lee’s research team used intense light on the surface of a copper wire to synthesize graphene, thereby increasing the production rate and lowering the production cost of the high-quality transparent-flexible electrode materials and consequently enabling its mass production. The results were published in the February 23 issue of Nano Energy.

This technology is applicable to various 2D materials, and its applicability can be extended to the synthesis of various metal-2D material nanowires.

The research team used copper-graphene nanowires to implement high-performance transparent-flexible electronic devices such as transparent-flexible electrodes, transparent supercapacitors and transparent heaters and to thereby demonstrate the commercial viability of this material.

DGIST Professor Yoonkyu Lee said, “We developed a method of mass-producing at a low production cost the next-generation transparent-flexible electrode material based on high-quality copper- nanowires. In the future, we expect that this technology will contribute to the production of core materials for high-performance transparent-flexible electronic devices, semitransparent solar cells, or transparent displays.”

More information: Jongyoun Kim et al, Ultrastable 2D material-wrapped copper nanowires for high-performance flexible and transparent energy devices, Nano Energy (2022). DOI: 10.1016/j.nanoen.2022.108067

Source: Researchers synthesize graphene using intense light

OpenAI’s ChatGPT Blocked In Italy by Privacy Watchdog – using kids as an excuse is almost always flimsy

Italy’s privacy watchdog said Friday it had blocked the controversial robot ChatGPT, saying the artificial intelligence app did not respect user data and could not verify users’ age.

The decision “with immediate effect” will result in “the temporary limitation of the processing of Italian user data vis-a-vis OpenAI”, the Italian Data Protection Authority said.

The agency has launched an investigation.

[…]

The watchdog said that on March 20, the app experienced a data breach involving user conversations and payment information.

It said there was no legal basis to justify “the mass collection and storage of personal data for the purpose of ‘training’ the algorithms underlying the operation of the platform”.

It also said that since there was no way to verify the age of users, the app “exposes minors to absolutely unsuitable answers compared to their degree of development and awareness.”

It said the company had 20 days to respond how it would address the watchdog’s concerns, under penalty of a 20-million-euro ($21.7-million) fine, or up to 4 percent of annual revenues.

[…]

Source: OpenAI’s ChatGPT Blocked In Italy: Privacy Watchdog | Barron’s

I am pretty sure none of the search engines verify age and store user data (ok duckduckgo is an exception) or give answers that may “expose” the little snowflake “minors to absolutely unsuitable answers compared to their degree of development and awareness.”

There is a race on to catch up to OpenAI and people are obviously losing, so crushing OpenAI is the way to go.

‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics

[…] The software engineers behind these systems are employees of NTC Vulkan. On the surface, it looks like a run-of-the-mill cybersecurity consultancy. However, a leak of secret files from the company has exposed its work bolstering Vladimir Putin’s cyberwarfare capabilities.

Thousands of pages of secret documents reveal how Vulkan’s engineers have worked for Russian military and intelligence agencies to support hacking operations, train operatives before attacks on national infrastructure, spread disinformation and control sections of the internet.

The company’s work is linked to the federal security service or FSB, the domestic spy agency; the operational and intelligence divisions of the armed forces, known as the GOU and GRU; and the SVR, Russia’s foreign intelligence organisation.

A diagram showing a Vulkan hacking reconnaissance system codenamed Scan, developed since 2018.
A diagram showing a Vulkan hacking reconnaissance system codenamed Scan, developed since 2018.

One document links a Vulkan cyber-attack tool with the notorious hacking group Sandworm, which the US government said twice caused blackouts in Ukraine, disrupted the Olympics in South Korea and launched NotPetya, the most economically destructive malware in history. Codenamed Scan-V, it scours the internet for vulnerabilities, which are then stored for use in future cyber-attacks.

Another system, known as Amezit, amounts to a blueprint for surveilling and controlling the internet in regions under Russia’s command, and also enables disinformation via fake social media profiles. A third Vulkan-built system – Crystal-2V – is a training program for cyber-operatives in the methods required to bring down rail, air and sea infrastructure. A file explaining the software states: “The level of secrecy of processed and stored information in the product is ‘Top Secret’.”

The Vulkan files, which date from 2016 to 2021, were leaked by an anonymous whistleblower angered by Russia’s war in Ukraine. Such leaks from Moscow are extremely rare. Days after the invasion in February last year, the source approached the German newspaper Süddeutsche Zeitung and said the GRU and FSB “hide behind” Vulkan.

[…]

Five western intelligence agencies confirmed the Vulkan files appear to be authentic. The company and the Kremlin did not respond to multiple requests for comment.

The leak contains emails, internal documents, project plans, budgets and contracts. They offer insight into the Kremlin’s sweeping efforts in the cyber-realm, at a time when it is pursuing a brutal war against Ukraine. It is not known whether the tools built by Vulkan have been used for real-world attacks, in Ukraine or elsewhere.

[…]

Some documents in the leak contain what appear to be illustrative examples of potential targets. One contains a map showing dots across the US. Another contains the details of a nuclear power station in Switzerland.

A map of the US found in the leaked Vulkan files as part of the multi-faceted Amezit system.
A map of the US found in the leaked Vulkan files as part of the multi-faceted Amezit system.

One document shows engineers recommending Russia add to its own capabilities by using hacking tools stolen in 2016 from the US National Security Agency and posted online.

John Hultquist, the vice-president of intelligence analysis at the cybersecurity firm Mandiant, which reviewed selections of the material at the request of the consortium, said: “These documents suggest that Russia sees attacks on civilian critical infrastructure and social media manipulation as one and the same mission, which is essentially an attack on the enemy’s will to fight.”

[…]

One of Vulkan’s most far-reaching projects was carried out with the blessing of the Kremlin’s most infamous unit of cyberwarriors, known as Sandworm. According to US prosecutors and western governments, over the past decade Sandworm has been responsible for hacking operations on an astonishing scale. It has carried out numerous malign acts: political manipulation, cyber-sabotage, election interference, dumping of emails and leaking.

Sandworm disabled Ukraine’s power grid in 2015. The following year it took part in Russia’s brazen operation to derail the US presidential election. Two of its operatives were indicted for distributing emails stolen from Hillary Clinton’s Democrats using a fake persona, Guccifer 2.0. Then in 2017 Sandworm purloined further data in an attempt to influence the outcome of the French presidential vote, the US says.

That same year the unit unleashed the most consequential cyber-attack in history. Operatives used a bespoke piece of malware called NotPetya. Beginning in Ukraine, NotPetya rapidly spread across the globe. It knocked offline shipping firms, hospitals, postal systems and pharmaceutical manufacturers – a digital onslaught that spilled over from the virtual into the physical world.

[…]

Hacking groups such as Sandworm penetrate computer systems by first looking for weak spots. Scan-V supports that process, conducting automated reconnaissance of potential targets around the world in a hunt for potentially vulnerable servers and network devices. The intelligence is then stored in a data repository, giving hackers an automated means of identifying targets.

[…]

One part of Amezit is domestic-facing, allowing operatives to hijack and take control of the internet if unrest breaks out in a Russian region, or the country gains a stronghold over territory in a rival nation state, such as Ukraine. Internet traffic deemed to be politically harmful can be removed before it has a chance to spread.

A 387-page internal document explains how Amezit works. The military needs physical access to hardware, such as mobile phone towers, and to wireless communications. Once they control transmission, traffic can be intercepted. Military spies can identify people browsing the web, see what they are accessing online, and track information that users are sharing.

[…]

the firm developed a bulk collection program for the FSB called Fraction. It combs sites such as Facebook or Odnoklassniki – the Russian equivalent – looking for key words. The aim is to identify potential opposition figures from open source data.

[…]

This Amezit sub-system allows the Russian military to carry out large-scale covert disinformation operations on social media and across the internet, through the creation of accounts that resemble real people online, or avatars. The avatars have names and stolen personal photos, which are then cultivated over months to curate a realistic digital footprint.

The leak contains screenshots of fake Twitter accounts and hashtags used by the Russian military from 2014 until earlier this year. They spread disinformation, including a conspiracy theory about Hillary Clinton and a denial that Russia’s bombing of Syria killed civilians. Following the invasion of Ukraine, one Vulkan-linked fake Twitter account posted: “Excellent leader #Putin”.

A tweet from a fake social media account linked to Vulkan.
A tweet from a fake social media account linked to Vulkan.

Another Vulkan-developed project linked to Amezit is far more threatening. Codenamed Crystal-2V, it is a training platform for Russian cyber-operatives. Capable of allowing simultaneous use by up to 30 trainees, it appears to simulate attacks against a range of essential national infrastructure targets: railway lines, electricity stations, airports, waterways, ports and industrial control systems.

[…]

 

Source: ‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics | Cyberwar | The Guardian

OpenAI may have to halt ChatGPT releases following FTC complaint by idiots who think you’re a bigger idiot than them

A public challenge could put a temporary stop to the deployment of ChatGPT and similar AI systems. The nonprofit research organization Center for AI and Digital Policy (CAIDP) has filed a complaint with the Federal Trade Commission (FTC) alleging that OpenAI is violating the FTC Act through its releases of large language AI models like GPT-4. That model is “biased, deceptive” and threatens both privacy and public safety, CAIDP claims. Likewise, it supposedly fails to meet Commission guidelines calling for AI to be transparent, fair and easy to explain.

The Center wants the FTC to investigate OpenAI and suspend future releases of large language models until they meet the agency’s guidelines. The researchers want OpenAI to require independent reviews of GPT products and services before they launch. CAIDP also hopes the FTC will create an incident reporting system and formal standards for AI generators.

We’ve asked OpenAI for comment. The FTC has declined to comment. CAIDP president Marc Rotenberg was among those who signed an open letter demanding that OpenAI and other AI researchers pause work for six months to give time for ethics discussions. OpenAI founder Elon Musk also signed the letter.

Critics of ChatGPT, Google Bard and similar models have warned of problematic output, including inaccurate statements, hate speech and bias. Users also can’t repeat results, CAIDP says. The Center points out that OpenAI itself warns AI can “reinforce” ideas whether or not they’re true. While upgrades like GPT-4 are more reliable, there’s a concern people may rely on the AI without double-checking its content.

There’s no guarantee the FTC will act on the complaint. If it does set requirements, though, the move would affect development across the AI industry. Companies would have to wait for assessments, and might face more repercussions if their models fail to meet the Commission’s standards. While this might improve accountability, it could also slow the currently rapid pace of AI development.

Source: OpenAI may have to halt ChatGPT releases following FTC complaint | Engadget

Every LLN AI being released right now is pretty clear that it’s not a single source of truth, that mistakes will be made and that you need to check the output yourself. The signing of the letter to stop AI development smacks of people who are so far behind in the race wanting to quietly catch up until the moratorium is lifted and this action sounds a lot like this organisation being in someone’s pocket.

Virgin Orbit officially shutters its space launch operations

Virgin Orbit’s days of slinging satellites into space aboard aircraft-launched rockets have come to an end Thursday. After six years in business, Virgin’s satellite launch subsidiary has announced via SEC filing that it does not have the funding to continue operations and will be shuttering for “the foreseeable future,” per CNBC. Nearly 90 percent of Virgin Orbit’s employees — 675 people in total — will be laid off immediately.

Virgin Orbit was founded in 2017 for the purpose of developing and commercializing LauncherOne, a satellite launch system fitted under a modified 747 airliner, dubbed Cosmic Girl. The system was designed to put 500 pounds of cubesats into Low Earth Orbit by firing them in a rocket from said airliner flying at an altitude of 30,000 – 50,000 feet. Despite a string of early successes — both in terms of development milestones and expanding service contracts with the UK military, LauncherOne’s first official test in May of 2020 failed to deliver its simulated payload into orbit.

A second attempt the following January in 2022 however was a success with the launch of 10 NASA cube sats into LEO, as was Virgin Orbit’s first commercial satellite launch that June. It successfully sent seven more satellites into orbit in January 2022 and quietly launched Space Force assets that July.

In all, Virgin Orbit made six total flights between 2020 and 2023, only four successfully. The most recent attempt was dubbed the Start Me Up event and was supposed to mark the first commercial space launch from UK soil. Despite the rocket successfully separating from its parent aircraft, an upper stage “anomaly” prevented the rocket’s payload from entering orbit. It was later determined that a $100 fuel filter had failed and resulted in the fault.

As TechCrunch points out, Virgin Group founder, Sir Richard Branson, “threw upwards of $55 million to the sinking space company,” in recent months but Start Me Up’s embarrassing failure turned out to be the final straw. On March 16th, Virgin Orbit announced an “operational pause” and worker furlough for its roughly 750 employees as company leadership scrambled to find new funding sources. The company extended the furlough two weeks later and called it quits on Thursday.

“Unfortunately, we’ve not been able to secure the funding to provide a clear path for this company,” Virgin CEO Dan Hart said in an all-hands call obtained by CNBC. “We have no choice but to implement immediate, dramatic and extremely painful changes.”

Impacted employees will reportedly receive severance packages, according to Hart, including a cash payment, continued benefits and a “direct pipeline” to Virgin Galactic’s hiring department. Virgin Orbit’s two top executives will also receive “golden parachute” severances which were approved by the company’s board, conveniently, back in mid-March right when the furloughs first took effect.

Source: Virgin Orbit officially shutters its space launch operations | Engadget

Integrating OpenAI’s ChatGPT and GPT-4: Socket’s story with code vulnerability scanning (it works very well)

Several months ago, Socket, which makes a freemium security scanner for JavaScript and Python projects, connected OpenAI’s ChatGPT model (and more recently its GPT-4 model) to its internal threat feed.

The results, according to CEO Feross Aboukhadijeh, were surprisingly good. “It worked way better than expected,” he told The Register in an email. “Now I’m sitting on a couple hundred vulnerabilities and malware packages and we’re rushing to report them as quick as we can.”

Socket’s scanner was designed to detect supply chain attacks. Available as a GitHub app or a command line tool, it scans JavaScript and Python projects in an effort to determine whether any of the many packages that may have been imported from the npm or PyPI registries contain malicious code.

Aboukhadijeh said Socket has confirmed 227 vulnerabilities, all using ChatGPT. The vulnerabilities fall into different categories and don’t share common characteristics.

The Register was provided with numerous examples of published packages that exhibited malicious behavior or unsafe practices, including: information exfiltration, SQL injection, hardcoded credentials, potential privilege escalation, and backdoors.

We were asked not to share several examples as they have yet to be removed, but here’s one that has already been dealt with.

  1. mathjs-min “Socket reported this to npm and it has been removed,” said Aboukhadijeh. “This was a pretty nasty one.”
    1. AI analysis: “The script contains a discord token grabber function which is a serious security risk. It steals user tokens and sends them to an external server. This is malicious behavior.”
    2. https://socket.dev/npm/package/mathjs-min/files/11.7.2/lib/cjs/plain/number/arithmetic.js#L28

“There are some interesting effects as well, such as things that a human might be persuaded of but the AI is marking as a risk,” Aboukhadijeh added.

“These decisions are somewhat subjective, but the AI is not dissuaded by comments claiming that a dangerous piece of code is not malicious in nature. The AI even includes a humorous comment indicating that it doesn’t trust the inline comment.”

  1. Example trello-enterprise
    1. AI analysis: “The script collects information like hostname, username, home directory, and current working directory and sends it to a remote server. While the author claims it is for bug bounty purposes, this behavior can still pose a privacy risk. The script also contains a blocking operation that can cause performance issues or unresponsiveness.”
    2. https://socket.dev/npm/package/trello-enterprises/files/1000.1000.1000/a.js

Aboukhadijeh explained that the software packages at these registries are vast and it’s difficult to craft rules that thoroughly plumb the nuances of every file, script, and bit of configuration data. Rules tend to be fragile and often produce too much detail or miss things a savvy human reviewer would catch.

Applying human analysis to the entire corpus of a package registry (~1.3 million for npm and ~450,000 for PyPI) just isn’t feasible, but machine learning models can pick up some of the slack by helping human reviewers focus on the more dubious code modules.

“Socket is analyzing every npm and PyPI package with AI-based source code analysis using ChatGPT,” said Aboukhadijeh.

“When it finds something problematic in a package, we flag it for review and ask ChatGPT to briefly explain its findings. Like all AI-based tooling, this may produce some false positives, and we are not enabling this as a blocking issue until we gather more feedback on the feature.”

Aboukhadijeh provided The Register with a sample report from its ChatGPT helper that identifies risky, though not conclusively malicious behavior. In this instance, the machine learning model offered this assessment, “This script collects sensitive information about the user’s system, including username, hostname, DNS servers, and package information, and sends it to an external server.”

Screenshot of ChatGPT report for Socket security scanner

Screenshot of ChatGPT report for Socket security scanner – Click to enlarge

Socket ChatGPT advisory screenshot

What a ChatGPT-based Socket advisory looks like … Click to enlarge

According to Aboukhadijeh, Socket was designed to help developers make informed decisions about risk in a way that doesn’t interfere with their work. So raising the alarm about every install script – a common attack vector – can create too much noise. Analysis of these scripts using a large language model dials the alarm bell down and helps developers recognize real problems. And these models are becoming more capable.

[…]

Source: Integrating OpenAI’s ChatGPT and GPT-4: Socket’s story • The Register

Stressed plants emit airborne sounds that can be detected from more than a meter away

What does a stressed plant sound like? A bit like bubble-wrap being popped. Researchers in Israel report in the journal Cell on March 30 that tomato and tobacco plants that are stressed—from dehydration or having their stems severed—emit sounds that are comparable in volume to normal human conversation. The frequency of these noises is too high for our ears to detect, but they can probably be heard by insects, other mammals, and possibly other plants.

“Even in a quiet field, there are actually sounds that we don’t hear, and those sounds carry information,” says senior author Lilach Hadany, an and theoretician at Tel Aviv University. “There are animals that can hear these sounds, so there is the possibility that a lot of acoustic interaction is occurring.”

Although ultrasonic vibrations have been recorded from plants before, this is the first evidence that they are airborne, a fact that makes them more relevant for other organisms in the environment. “Plants interact with insects and other animals all the time, and many of these organisms use sound for communication, so it would be very suboptimal for plants to not use sound at all,” says Hadany.

The researchers used microphones to record healthy and stressed tomato and , first in a soundproofed acoustic chamber and then in a noisier greenhouse environment. They stressed the plants via two methods: by not watering them for several days and by cutting their stems. After recording the plants, the researchers trained a to differentiate between unstressed plants, thirsty plants, and cut plants.

The team found that stressed plants emit more sounds than unstressed plants. The plant sounds resemble pops or clicks, and a single stressed plant emits around 30–50 of these clicks per hour at seemingly random intervals, but unstressed plants emit far fewer sounds. “When tomatoes are not stressed at all, they are very quiet,” says Hadany.

00:00
00:36
An audio recording of plant sounds. The frequency was lowered so that it is audible to human ears. Credit: Khait et al.

Water-stressed plants began emitting noises before they were visibly dehydrated, and the frequency of sounds peaked after five days with no water before decreasing again as the plants dried up completely. The types of sound emitted differed with the cause of stress. The machine-learning algorithm was able to accurately differentiate between dehydration and stress from cutting and could also discern whether the sounds came from a tomato or tobacco plant.

Although the study focused on tomato and tobacco plants because of their ease to grow and standardize in the laboratory, the research team also recorded a variety of other plant species. “We found that many plants—corn, wheat, grape, and cactus plants, for example—emit sounds when they are stressed,” says Hadany.

A photo of a cactus being recorded. Credit: Itzhak Khait

The exact mechanism behind these noises is unclear, but the researchers suggest that it might be due to the formation and bursting of air bubbles in the plant’s vascular system, a process called cavitation.

Whether or not the plants are producing these sounds in order to communicate with other organisms is also unclear, but the fact that these sounds exist has big ecological and evolutionary implications. “It’s possible that other organisms could have evolved to hear and respond to these sounds,” says Hadany. “For example, a moth that intends to lay eggs on a plant or an animal that intends to eat a plant could use the sounds to help guide their decision.”

Other plants could also be listening in and benefiting from the sounds. We know from previous research that plants can respond to sounds and vibrations: Hadany and several other members of the team previously showed that plants increase the concentration of sugar in their nectar when they “hear” the sounds made by pollinators, and other studies have shown that plants change their in response to sounds. “If other plants have information about stress before it actually occurs, they could prepare,” says Hadany.

An illustration of a dehydrated tomato plant being recorded using a microphone. Credit: Liana Wait

Sound recordings of plants could be used in agricultural irrigation systems to monitor crop hydration status and help distribute water more efficiently, the authors say.

“We know that there’s a lot of ultrasound out there—every time you use a microphone, you find that a lot of stuff produces sounds that we humans cannot hear—but the fact that plants are making these sounds opens a whole new avenue of opportunities for communication, eavesdropping, and exploitation of these sounds,” says co-senior author Yossi Yovel, a neuro-ecologist at Tel Aviv University.

“So now that we know that plants do emit sounds, the next question is—’who might be listening?'” says Hadany. “We are currently investigating the responses of other organisms, both animals and , to these sounds, and we’re also exploring our ability to identify and interpret the sounds in completely natural environments.”

More information: Lilach Hadany, Sounds emitted by plants under stress are airborne and informative, Cell (2023). DOI: 10.1016/j.cell.2023.03.009. www.cell.com/cell/fulltext/S0092-8674(23)00262-3

Source: Stressed plants emit airborne sounds that can be detected from more than a meter away

This is not a newly discovered phenomenon, plants, grasses and trees are very good at detecting and warning, eg

Stressed plants show altered phenotypes, including changes in color, smell, and shape. Yet, the possibility that plants emit airborne sounds when stressed – similarly to many animals – has not been investigated. Here we show, to our knowledge for the first time, that stressed plants emit airborne sounds that can be recorded remotely, both in acoustic chambers and in greenhouses. We recorded ∼65 dBSPL ultrasonic sounds 10 cm from tomato and tobacco plants, implying that these sounds could be detected by some organisms from up to several meters away. We developed machine learning models that were capable of distinguishing between plant sounds and general noises, and identifying the condition of the plants – dry, cut, or intact – based solely on the emitted sounds. Our results suggest that animals, humans, and possibly even other plants, could use sounds emitted by a plant to gain information about the plant’s condition. More investigation on plant bioacoustics in general and on sound emission in plants in particular may open new avenues for understanding plants and their interactions with the environment, and it may also have a significant impact on agriculture.

Source: Plants emit informative airborne sounds under stress

The remarkable ability of plants to respond to their environment has led some scientists to believe it’s a sign of conscious awareness. A new opinion paper argues against this position, saying plants “neither possess nor require consciousness.”

Many of us take it for granted that plants, which lack a brain or central nervous system, wouldn’t have the capacity for conscious awareness. That’s not to suggest, however, that plants don’t exhibit intelligence. Plants seem to demonstrate a startling array of abilities, such as computation, communication, recognizing overcrowding, and mobilizing defenses, among other clever vegetative tricks.

To explain these apparent behaviors, a subset of scientists known as plant neurobiologists has argued that plants possess a form of consciousness. Most notably, evolutionary ecologist Monica Gagliano has performed experiments that allegedly hint at capacities such as habituation (learning from experience) and classical conditioning (like Pavlov’s salivating dogs). In these experiments, plants apparently “learned” to stop curling their leaves after being dropped repeatedly or to spread their leaves in anticipation of a light source. Armed with this experimental evidence, Gagliano and others have claimed, quite controversially, that because plants can learn and exhibit other forms of intelligence, they must be conscious.

Nonsense, argues a new paper published today in Trends in Plant Science. The lead author of the new paper, biologist Lincoln Taiz from the University of California at Santa Cruz, isn’t denying plant intelligence, but makes a strong case against their being conscious.

Source: Are Plants Conscious? Researchers Argue, but agree they are intelligent.

  • Ultrasonic acoustic emission (UAE) in trees is often related to collapsing water columns in the flow path as a result of tensions that are too strong (cavitation). However, in a decibel (dB) range below that associated with cavitation, a close relationship was found between UAE intensities and stem radius changes.
  • UAE was continuously recorded on the stems of mature field-grown trees of Scots pine (Pinus sylvestris) and pubescent oak (Quercus pubescens) at a dry inner-Alpine site in Switzerland over two seasons. The averaged 20-Hz records were related to microclimatic conditions in air and soil, sap-flow rates and stem-radius fluctuations de-trended for growth (ΔW).
  • Within a low-dB range (27 ± 1 dB), UAE regularly increased and decreased in a diurnal rhythm in parallel with ΔW on cloudy days and at night. These low-dB emissions were interrupted by UAE abruptly switching between the low-dB range and a high-dB range (36 ± 1 dB) on clear, sunny days, corresponding to the widely supported interpretation of UAE as sound from cavitations.
  • It is hypothesized that the low-dB signals in drought-stressed trees are caused by respiration and/or cambial growth as these physiological activities are tissue water-content dependent and have been shown to produce courses of CO2 efflux similar to our courses of ΔW and low-dB UAE.

Source: Ultrasonic acoustic emissions in drought-stressed trees – more than signals from cavitation? (2008)

And more on the controversy here

‘Pausing AI Developments Isn’t Enough. We Need To Shut It All Down’ say AI experts who struggling to keep up with the pace of development (and need some time to catch up with the leaders)

Earlier today, more than 1,100 artificial intelligence experts, industry leaders and researchers signed a petition calling on AI developers to stop training models more powerful than OpenAI’s ChatGPT-4 for at least six months. Among those who refrained from signing it was Eliezer Yudkowsky, a decision theorist from the U.S. and lead researcher at the Machine Intelligence Research Institute. He’s been working on aligning Artificial General Intelligence since 2001 and is widely regarded as a founder of the field.

“This 6-month moratorium would be better than no moratorium,” writes Yudkowsky in an opinion piece for Time Magazine. “I refrained from signing because I think the letter is understating the seriousness of the situation and asking for too little to solve it.” Yudkowsky cranks up the rhetoric to 100, writing: “If somebody builds a too-powerful AI, under present conditions, I expect that every single member of the human species and all biological life on Earth dies shortly thereafter.” Here’s an excerpt from his piece: The key issue is not “human-competitive” intelligence (as the open letter puts it); it’s what happens after AI gets to smarter-than-human intelligence. Key thresholds there may not be obvious, we definitely can’t calculate in advance what happens when, and it currently seems imaginable that a research lab would cross critical lines without noticing. […] It’s not that you can’t, in principle, survive creating something much smarter than you; it’s that it would require precision and preparation and new scientific insights, and probably not having AI systems composed of giant inscrutable arrays of fractional numbers. […]

It took more than 60 years between when the notion of Artificial Intelligence was first proposed and studied, and for us to reach today’s capabilities. Solving safety of superhuman intelligence — not perfect safety, safety in the sense of “not killing literally everyone” — could very reasonably take at least half that long. And the thing about trying this with superhuman intelligence is that if you get that wrong on the first try, you do not get to learn from your mistakes, because you are dead. Humanity does not learn from the mistake and dust itself off and try again, as in other challenges we’ve overcome in our history, because we are all gone.

Trying to get anything right on the first really critical try is an extraordinary ask, in science and in engineering. We are not coming in with anything like the approach that would be required to do it successfully. If we held anything in the nascent field of Artificial General Intelligence to the lesser standards of engineering rigor that apply to a bridge meant to carry a couple of thousand cars, the entire field would be shut down tomorrow. We are not prepared. We are not on course to be prepared in any reasonable time window. There is no plan. Progress in AI capabilities is running vastly, vastly ahead of progress in AI alignment or even progress in understanding what the hell is going on inside those systems. If we actually do this, we are all going to die. You can read the full letter signed by AI leaders here.

Source: ‘Pausing AI Developments Isn’t Enough. We Need To Shut It All Down’ – Slashdot

REKKIE AR / HUD ski goggles

The successor to the Recon Instruments Mod Live is here – the Rekkie AR ski goggles. They use a screen which reflects onto the plastic transparent goggle plate, so you can buy different types of lenses. The system shows maps, compass, speed, etc and is controlled by a large box on the strap which connects to the helmet, so in that respect not quite as elegant as the bluetooth remote of the Recon Mod system. The price is not bad at all at $349,-

Source: Rekkie – REKKIE

Microsoft’s new Security Copilot will help network admins respond to threats in minutes, not day

[…]

with Microsoft’s unveiling of the new Security Copilot AI at its inaugural Microsoft Secure event. The automated enterprise-grade security system is powered by OpenAI’s GPT-4, runs on the Azure infrastructure and promises admins the ability “to move at the speed and scale of AI.”

Security Copilot is similar to the large language model (LLM) that drives the Bing Copilot feature, but with a training geared heavily towards network security rather than general conversational knowledge and web search optimization. […]

“Just since the pandemic, we’ve seen an incredible proliferation [in corporate hacking incidents],”Jakkal told Bloomberg. For example, “it takes one hour and 12 minutes on average for an attacker to get full access to your inbox once a user has clicked on a phishing link. It used to be months or weeks for someone to get access.”

[…]

Jakkal anticipates these new capabilities enabling Copilot-assisted admins to respond within minutes to emerging security threats, rather than days or weeks after the exploit is discovered. Being a brand new, untested AI system, Security Copilot is not meant to operate fully autonomously, a human admin needs to remain in the loop. “This is going to be a learning system,” she said. “It’s also a paradigm shift: Now humans become the verifiers, and AI is giving us the data.”

To more fully protect the sensitive trade secrets and internal business documents Security Copilot is designed to protect, Microsoft has also committed to never use its customers data to train future Copilot iterations. Users will also be able to dictate their privacy settings and decide how much of their data (or the insights gleaned from it) will be shared. The company has not revealed if, or when, such security features will become available for individual users as well.

Source: Microsoft’s new Security Copilot will help network admins respond to threats in minutes, not days | Engadget

Inaudible ultrasound attack can stealthily control your phone, smart speaker

American university researchers have developed a novel attack called “Near-Ultrasound Inaudible Trojan” (NUIT) that can launch silent attacks against devices powered by voice assistants, like smartphones, smart speakers, and other IoTs.

The team of researchers consists of professor Guenevere Chen of the University of Texas in San Antonio (UTSA), her doctoral student Qi Xia, and professor Shouhuai Xu of the University of Colorado (UCCS).

The team demonstrated NUIT attacks against modern voice assistants found inside millions of devices, including Apple’s Siri, Google’s Assistant, Microsoft’s Cortana, and Amazon’s Alexa, showing the ability to send malicious commands to those devices.

Inaudible attacks

The main principle that makes NUIT effective and dangerous is that microphones in smart devices can respond to near-ultrasound waves that the human ear cannot, thus performing the attack with minimal risk of exposure while still using conventional speaker technology.

In a post on USTA’s site, Chen explained that NUIT could be incorporated into websites that play media or YouTube videos, so tricking targets into visiting these sites or playing malicious media on trustworthy sites is a relatively simple case of social engineering.

The researchers say the NUIT attacks can be conducted using two different methods.

The first method, NUIT-1, is when a device is both the source and target of the attack. For example, an attack can be launched on a smartphone by playing an audio file that causes the device to perform an action, such as opening a garage door or sending a text message.

The other method, NUIT-2, is when the attack is launched by a device with a speaker to another device with a microphone, such as a website to a smart speaker.

Source: Inaudible ultrasound attack can stealthily control your phone, smart speaker

This is like smart units like Amazon Echo / Alexa being controlled by TV commercials

Meatball from long-extinct mammoth created by food firm

A mammoth meatball has been created by a cultivated meat company, resurrecting the flesh of the long-extinct animals.

The project aims to demonstrate the potential of meat grown from cells, without the slaughter of animals, and to highlight the link between large-scale livestock production and the destruction of wildlife and the climate crisis.

The mammoth meatball was produced by Vow Food, an Australian company, which is taking a different approach to cultured meat.

There are scores of companies working on replacements for conventional meat, such as chicken, pork and beef. But Vow Foods is aiming to mix and match cells from unconventional species to create new kinds of meat.

The company has already investigated the potential of more than 50 species, including alpaca, buffalo, crocodile, kangaroo, peacocks and different types of fish.

The first cultivated meat to be sold to diners will be Japanese quail, which the company expects will be in restaurants in Singapore this year.

“We have a behaviour change problem when it comes to meat consumption,” said George Peppou, CEO of Vow Food.

“The goal is to transition a few billion meat eaters away from eating [conventional] animal protein to eating things that can be produced in electrified systems.

“And we believe the best way to do that is to invent meat. We look for cells that are easy to grow, really tasty and nutritious, and then mix and match those cells to create really tasty meat.”

Tim Noakesmith, who cofounded Vow Food with Peppou, said: “We chose the woolly mammoth because it’s a symbol of diversity loss and a symbol of climate change.” The creature is thought to have been driven to extinction by hunting by humans and the warming of the world after the last ice age.

[…]

Cultivated meat – chicken from Good Meat – is currently only sold to consumers in Singapore, but two companies have now passed an approval process in the US.

In 2018, another company used DNA from an extinct animal to create gummy bears made from gelatine from a mastodon, another elephant-like animal.

Vow Food worked with Prof Ernst Wolvetang, at the Australian Institute for Bioengineering at the University of Queensland, to create the mammoth muscle protein. His team took the DNA sequence for mammoth myoglobin, a key muscle protein in giving meat its flavour, and filled in the few gaps using elephant DNA.

This sequence was placed in myoblast stem cells from a sheep, which replicated to grow to the 20bn cells subsequently used by the company to grow the mammoth meat.

“It was ridiculously easy and fast,” said Wolvetang. “We did this in a couple of weeks.” Initially, the idea was to produce dodo meat, he said, but the DNA sequences needed do not exist.

[…]

Seren Kell, at the Good Food Institute Europe, said: “I hope this fascinating project will open up new conversations about cultivated meat’s extraordinary potential to produce more sustainable food.

“However, as the most common sources of meat are farm animals such as cattle, pigs, and poultry, most of the sustainable protein sector is focused on realistically replicating meat from these species.

“By cultivating beef, pork, chicken and seafood we can have the most impact in terms of reducing emissions from conventional animal agriculture.”

[…]

Source: Meatball from long-extinct mammoth created by food firm | Meat industry | The Guardian

Italian art experts (and rest of world) astonished by David statue uproar in Florida

The Florence museum that houses Michelangelo’s statue of David has invited teachers and students from a Florida school to visit, after an uproar over an art lesson.

The school’s principal quit after a complaint about a sixth-grade art class that included an image of the statue.

A parent had complained the image was pornographic.

Cecilie Hollberg, director of Galleria dell’Accademia, has now issued the invitation to the class.

She said the principal should be “rewarded, not punished”.

“Talking about the Renaissance without showing the David, an undisputed icon of art and culture and of that historical period, would make no sense,” Ms Hollberg said.

The controversy began when the board of Tallahassee Classical School – a charter school in Florida’s state capital – pressured principal Hope Carrasquilla to resign after three parents complained about a lesson that included a photo of the 17ft nude marble statue.

The statue, one of the most famous in Western history, depicts the biblical David going to fight Goliath armed only with a sling and his faith in God.

[…]

The incident has left Florentines and experts on Renaissance art bewildered.

The David is considered a masterpiece of the Italian Renaissance and a symbol of humanist values. It has been displayed in the Galleria dell’Accademia since 1873.

Ms Hollberg said she was “astonished”, stating that to think that the David statue could be considered pornographic means not only failing to understand the Bible, but Western culture itself.

“I cannot believe that actually happened, at first I thought it was fake news, so improbable and absurd was it,” she said.

“A distinction must be made between nudity and pornography. There is nothing pornographic or aggressive about the David, he is a young boy, a shepherd, who even according to the Bible did not have ostentatious clothes but wanted to defend his people with what he had.”

[…]

According to Florentine art historian and dean of the University for Foreigners in Siena, Tomaso Montanari, such an attitude is “disconcerting”.

“First comes the dismay at the absence of educational freedom, as it should not be restricted or manipulated by families,” Mr Montanari said.

“On the other hand, from a cultural perspective, the Western world has a tendency to associate fundamentalism and censorship with other societies, believing it possesses the capability to spread democratic ideals worldwide.

“But this cultural backsliding clearly highlights the presence of fundamentalist views within the West as well.”

[…]

Back in Florence, Ms Hollberg remarked: “From majestic statues to charming fountains and paintings, Italy is overflowing with works of art, not just in its museums, but in all its cities, squares and streets, with some featuring naked figures.

“Does that make it pornography? Should entire cities be shut down because of the artistic depictions of the human form?”

Source: Italian art experts astonished by David statue uproar in Florida – BBC News

ChatGPT Retrieval plugin allows you to embed and store memory of your chats and other knowledge bases

This is a plugin for ChatGPT that enables semantic search and retrieval of personal or organizational documents. It allows users to obtain the most relevant document snippets from their data sources, such as files, notes, or emails, by asking questions or expressing needs in natural language. Enterprises can make their internal documents available to their employees through ChatGPT using this plugin.

[…]

Users can refine their search results by using metadata filters by source, date, author, or other criteria. The plugin can be hosted on any cloud platform that supports Docker containers, such as Fly.io, Heroku or Azure Container Apps. To keep the vector database updated with the latest documents, the plugin can process and store documents from various data sources continuously

[…]

A notable feature of the Retrieval Plugin is its capacity to provide ChatGPT with memory. By utilizing the plugin’s upsert endpoint, ChatGPT can save snippets from the conversation to the vector database for later reference (only when prompted to do so by the user). This functionality contributes to a more context-aware chat experience by allowing ChatGPT to remember and retrieve information from previous conversations. Learn how to configure the Retrieval Plugin with memory here.

[…]

Github openai/chatgpt-retreival-plugin

‘A Blow for Libraries’: Internet Archive Loses Copyright Infringement Lawsuit by money grubbing publishers

A judge ruled against Internet Archive, a free online digital library, on Friday in a lawsuit filed by four top publishers who claimed the company was in violation of copyright laws. The publishers, Hachette Book Group, HarperCollins, John Wiley & Sons, and Penguin Random House filed the lawsuit against Internet Archive in 2020, claiming the company had illegally scanned and uploaded 127 of their books for readers to download for free, detracting from their sales and the authors’ royalties.

U.S. District Court Judge John G. Koeltl ruled in favor of the publishing houses in saying that Internet Archive was making “derivative” works by transforming printed books into e-books and distributing them.

[…]

Koeltl’s decision was in part based on the law that libraries are required to pay publishers for continued use of their digital book copies and are only permitted to lend these digital copies a specified number of times, called controlled digital lending, as agreed by the publisher [not the writer!] before paying to renew its license.

[…]

However, according to the court ruling, Hachette and Penguin provide one or two-year terms to libraries, in which the eBook can be rented an unlimited number of times before the library has to purchase a new license. HarperCollins allows the library to circulate a digital copy 26 times before the license has to be renewed, while Wiley has continued to experiment with several subscription models.

[…]

The judge ruled that because Internet Archive was purchasing the book only once before scanning it and lending each digital copy an unlimited number of times, it is an infringement of copyright and “concerns the way libraries lend eBooks.

[…]

Source: ‘A Blow for Libraries’: Internet Archive Loses Copyright Infringement Lawsuit

The decision was “a blow to all libraries and the communities we serve,” argued Chris Freeland, the director of Open Libraries at the Internet Archive. In a blog post he argued the decision “impacts libraries across the U.S. who rely on controlled digital lending to connect their patrons with books online. It hurts authors by saying that unfair licensing models are the only way their books can be read online. And it holds back access to information in the digital age, harming all readers, everywhere.
The Verge adds that the judge rejected “fair use” arguments which had previously protected a 2014 digital book preservation project by Google Books and HathiTrust:

Koetl wrote that any “alleged benefits” from the Internet Archive’s library “cannot outweigh the market harm to the publishers,” declaring that “there is nothing transformative about [Internet Archive’s] copying and unauthorized lending,” and that copying these books doesn’t provide “criticism, commentary, or information about them.” He notes that the Google Books use was found “transformative” because it created a searchable database instead of simply publishing copies of books on the internet.

Their lending model works like this. They purchase a paper copy of the book, scan it to digital format, and then lend out the digital copy to one person at a time. Their argument is that this is no different than lending out the paper copy that they legally own to one person at a time. It is not as cut and dry as you make it out to be.

Source: Internet Archive Loses in Court. Judge Rules They Can’t Scan and Lend eBooks

Last Monday was the day of the oral arguments in the Big Publishers’ lawsuit against libraries in the form of the Internet Archive. As we noted mid-week, publishers won’t quit until libraries are dead. And they got one step closer to that goal on Friday, when Judge John Koetl wasted no time in rejecting every single one of the Internet Archive’s arguments.

The fact that the ruling came out on the Friday after the Monday oral arguments suggests pretty strongly that Judge Koetl had his mind made up pretty quickly and was ready to kill a library with little delay. Of course, as we noted just last Wednesday, whoever lost at this stage was going to appeal, and the really important stuff was absolutely going to happen at the 2nd Circuit appeals court. It’s just that now the Internet Archives, and a bunch of important copyright concepts, are already starting to be knocked down a few levels.

I’ve heard from multiple people claiming that of course the Internet Archive was going to lose, because it was scanning books (!!) and lending them out and how could that be legal? But, the answer, as we explained multiple times, is that every piece of this copyright puzzle had already been deemed legal.

And the Internet Archive didn’t just jump into this without any thought. Two of the most well known legal scholars regarding copyright and libraries, David Hansen and Kyle Courtney, had written a white paper detailing exactly how and why the approach the Internet Archive took with Controlled Digital Lending easily fit within the existing contours and precedents of copyright law.

But, as we and others have discussed for ages, in the copyright world, there’s a long history of courts ignoring what the law actually says and just coming up with some way to say something is infringement if it feels wrong to them. And that’s what happened here.

A key part of the ruling, as in a large percentage of cases that are about fair use, is looking at whether or not the use of the copy is “transformative.” Judge Koetl is 100% positive it is not transformative.

There is nothing transformative about IA’s copying and unauthorized lending of the Works in Suit.7 IA does not reproduce the Works in Suit to provide criticism, commentary, or information about them. See 17 U.S.C. § 107. IA’s ebooks do not “add[] something new, with a further purpose or different character, altering the [originals] with new expression, meaning or message.” Campbell, 510 U.S. at 579. IA simply scans the Works in Suit to become ebooks and lends them to users of its Website for free. But a copyright holder holds the “exclusive[] right” to prepare, display, and distribute “derivative works based upon the copyrighted work.”

But… there’s a lot more to “transformative” use than simply adding something new or altering the meaning. In many cases, fair use is found in cases where you’re copying the exact same content, but for a different purpose, and the Internet Archive’s usage here seems pretty clearly transformative in that it’s changing the way the book can be consumed to make it easier for libraries to lend it out and patrons to read it. That is, the “transformation” is in the way the book can be lent, not the content of the book.

I know many people find this strange (and the judge did here as well) saying things like “but it’s the whole work.” Or “the use is the same because it’s still just reading the book.” But the Supreme Court already said, quite clearly, that such situations can be fair use, such as in the Sony v. Universal case that decided VCRs were legal, and that time shifting TV shows was clear fair use. In that ruling, they even cite Congress noting that “making a copy of a copyright work for… convenience” can be considered fair use.

Unfortunately, Judge Koetl effectively chops away a huge part of the Sony ruling in insisting that this is somehow different.

But Sony is plainly inapposite. IA is not comparable to the parties in Sony — either to Sony, the alleged contributory copyright infringer, or to the home viewers who used the Betamax machine for the noncommercial, nonprofit activity of watching television programs at home. Unlike Sony, which only sold the machines, IA scans a massive number of copies of books and makes them available to patrons rather than purchasing ebook licenses from the Publishers. IA is also unlike the home viewers in Sony, who engaged in the “noncommercial, nonprofit activity” of viewing at a more convenient time television programs that they had the right to view for free at the time they were originally broadcast. 464 U.S. at 449. The home viewers were not accused of making their television programs available to the general public. Although IA has the right to lend print books it lawfully acquired, it does not have the right to scan those books and lend the digital copies en masse.

But note what the Judge did here. Rather than rely on the text of what the Supreme Court actually said in Sony, he insists that he won’t apply the rules of Sony because the parties are different. But if the basic concepts and actions are covered by the Sony ruling, it seems silly to ignore them here as the judge did.

And the differences highlighted by the court here have no bearing on the actual issues and the specifics of fair use and the law. I mean, first of all, the fact that Koetl claims that the Internet Archive is not engaged in “noncommercial, nonprofit activity” is just weird. The Internet Archive is absolutely engaged in noncommerical, nonprofit activity.

The other distinctions are meaningless as well. No, IA is not building devices for people to buy, but in many ways IA’s position here should be seen as stronger than Sony’s because Sony actually was a commercial operation, and IA is literally acting as a library, increasing the convenience for its patrons, and doing so in a manner that is identical to lending out physical books. Sony created a machine, Betamax, that copied TV shows and allowed those who bought those machines to watch the show at a more convenient time. IA created a machine that copies books, and allows library patrons to access those books in a more convenient way.

Also, the Betamax (and VCR) were just as “available to the general public” as the Internet Archive is. The idea that they are substantially different is just… weird. And strikes me as pretty clearly wrong.

There’s another precedential oddity in the ruling. It relies pretty heavily on the somewhat terrible fair use ruling in the 2nd Circuit in the Warhol Foundation v. Goldsmith case. That case was so terrible that we (at the Copia Institute) weighed in with the Supreme Court to let them know how problematic it was, and the Supreme Court is still sitting on a decision in that case.

Which means the Supreme Court is soon to rule on it, and that could very much change or obliterate the case that Judge Koetl leans on heavily for his ruling.

Here, Judge Koetl repeatedly goes back to the Warhol well to make various arguments, especially around the question of the fourth fair use factor: the effect on the market. To me, this clearly weighs towards fair use, because it’s no different than a regular library. Libraries are allowed to buy (or receive donated) books and lend them out. That’s all the Open Library does here. So to argue there’s a negative impact on the market, the publishers rely on the fact that they’ve been able to twist and bend copyright law so much that they’ve created a new, extortionate market in ebook “licenses,” and then play all sorts of games to force people to buy the books rather than check them out of the library.

Judge Koetl seems particularly worried about how much damage this could do this artificially inflated market:

It is equally clear that if IA’s conduct “becomes widespread, it will adversely affect the potential market for the” Works in Suit. Andy Warhol Found., 11 F.4th at 48. IA could expand the Open Libraries project far beyond the current contributing partners, allowing new partners to contribute many more concurrent copies of the Works in Suit to increase the loan count. New organizations like IA also could emerge to perform similar functions, further diverting potential readers and libraries from accessing authorized library ebooks from the Publishers. This plainly risks expanded future displacement of the Publishers’ potential revenues.

But go back and read that paragraph again, and replace the key words to read that if libraries become widespread, it will adversely affect the potential market for buying books in bookstores… because libraries would be “diverting potential readers” from purchasing physical books, which “plainly risks expanded future displacement of the Publishers’ potential revenues.”

Again, the argument here is effectively that libraries themselves shouldn’t be allowed. And that seems like a problem?

Koetl also falls into the ridiculous trap of saying that “you can’t compete with free” and that libraries will favor CDL-scanned books over licensed ones:

An accused infringer usurps an existing market “where the infringer’s target audience and the nature of the infringing content is the same as the original.” Cariou, 714 F.3d at 709; see also Andy Warhol Found., 11 F.4th at 50. That is the case here. For libraries that are entitled to partner with IA because they own print copies of books in IA’s collection, it is patently more desirable to offer IA’s bootleg ebooks than to pay for authorized ebook licenses. To state the obvious, “[i]t is difficult to compete with a product offered for free.” Sony BMG Music Ent. v. Tenenbaum, 672 F. Supp. 2d 217, 231 (D. Mass. 2009).

Except that’s literally wrong. The licensed ebooks have many features that the scanned ones don’t. And many people (myself included!) prefer to check out licensed ebooks from our local libraries rather than the CDL ones, because they’re more readable. My own library offers the ability to check out books from either one, and defaults to recommending the licensed ebooks, because they’re a better customer experience, which is how tons of products “compete with free” all the time.

I mean, not to be simplistic here, but the bottled water business in the US is an over $90 billion market for something most people can get for free (or effectively free) from the tap. That’s three times the size of the book publishing market. So, uh, maybe don’t say “it’s difficult to compete with free.” Other industries do it just fine. The publishers are just being lazy.

Besides, based on this interpretation of Warhol, basically anyone can destroy fair use by simply making up some new, crazy, ridiculously priced, highly restrictive license that covers the same space as the fair use alternative, and claim that the alternative destroys the “market” for this ridiculous license. That can’t be how fair use works.

Anyway, one hopes first that the Supreme Court rejects the terrible 2nd Circuit ruling in the Warhol Foundation case, and that this in turn forces Judge Koetl to reconsider his argument. But given the pretzel he twisted himself into to ignore the Betamax case, it seems likely he’d still find against libraries like the Internet Archive.

Given that, it’s going to be important that the 2nd Circuit get this one right. As the Internet Archive’s Brewster Kahle said in a statement on the ruling:

“Libraries are more than the customer service departments for corporate database products. For democracy to thrive at global scale, libraries must be able to sustain their historic role in society—owning, preserving, and lending books.

This ruling is a blow for libraries, readers, and authors and we plan to appeal it.”

What happens next is going to be critical to the future of copyright online. Already people have pointed out how some of the verbiage in this ruling could have wide reaching impact on questions about copyright in generative AI products or many other kinds of fair use cases.

One hopes that the panel on the 2nd Circuit doesn’t breezily dismiss these issues like Judge Koetl did.

Source: Publishers Get One Step Closer To Killing Libraries

This money grab by publishers is disgusting, for more information and articles I have referenced them here