The Fraud Frontier: How AI Could Empower Scammers and What We Must Do Now

AI is accelerating at a rate that forces us to rethink not only what systems can create, but also what bad actors can abuse. The same advances that let machines compose music, synthesize voices or generate hyper-real imagery also lower the bar for realistic deception. Left unchecked, these capabilities will amplify traditional scams and enable new classes of fraud that are far harder to detect.

Below I outline the major risk vectors, why they matter and-critically-concrete safeguards we should implement now across engineering, product design, policy and everyday practice to reduce harm.

The Rise of AI-Created Art: Redefining Creativity in the 21st Century

The development of AI capable of generating images, music, and other creative outputs has reached a point where the boundaries between human and machine creativity are rapidly dissolving. Creative AI is no longer just a tool for artists – it is becoming the primary medium through which non-creatives can generate meaningful art and design.

For decades, society assumed that artistry required skill with tools – a paintbrush, a musical instrument, or a camera. But AI changes this paradigm. In fields like science, education, and literature, individuals who excel at communicating through text and structured logic can now instruct AI to produce visual and musical works far faster and at larger scale than traditionally trained artists.

The Adaptive Future: How AI Is Redefining the Role of the UI/UX Designer

A Perspective on Intelligent Systems and Human Experience Design

The rate at which artificial intelligence is learning is outpacing every design and engineering curve we’ve ever known. Where traditional UI and UX once defined how humans communicate with machines, AI is beginning to design those conversations itself, not from a manual or mood board, but from observing us in real time.

We’re witnessing the rise of systems that learn faster than any human design team could iterate, capable of predicting intent, emotion, and even preference before the user consciously acts.

Possible National Quarantine? How Deadly Is This Virus?

Reports and rumors have been surfacing that President Trump is currently mulling over a plan for a national shutdown. Such a shutdown would be unprecedented in U.S. history.

The plan would allow President Trump to mobilize the National Guard to help enforce a two-week quarantine of the public and require everyone to “stay at home..” This would also urge all businesses, other than grocery stores and pharmacies to close for the time being. According to the source named in the Washington Examiner article, this plan would not be announced until early next week.

This comes on the heels of more and more states and cities taking drastic measures on Friday to combat the ongoing spread of the coronavirus, which so far has infected roughly 14,000 Americans. 

COVID-19: Life After the Pandemic

E pluribus unum. Out of many, one. A fitting motto for the melting pot that is the United States and a fitting view of the world, whose frailty, humanity and interdependence has been laid bare by an invisible virus. While ground zero for coronavirus seems to have shifted from Asia to Europe and is now making its way to the U.S., whose level of national awareness has only recently kicked into gear with a presidential emergency declaration, it is not too soon to begin asking ourselves what life should look like after this moment of global and national solidarity.

Coping with the pandemic will be agonizingly hard for the global economy and for many millions of people who do not enjoy the inherent security and resilience of adequate healthcare coverage, savings, paid medical leave and other benefits. The societal trade off we now face is stark. As financially vulnerable people grapple with the false choice of complying with calls for social distancing to protect the medically at risk and themselves, while doing so at the peril of their own economic survival. In this environment, facing a 100-year pandemic threat that has grounded the global economy to a halt in 90 days (with governments throwing trillions of dollars at the invisible many-headed hydra that has once vibrant free moving societies on lockdown), basic benefits and social compliance are our best defense.

Shabaab Tries to Assassinate US Diplomat

A suicide bombing in Mogadishu today was an assassination attempt on the UN Special Envoy to Somalia, an American diplomat, according to Shabaab.

Several people were killed or wounded when a Shabaab suicide bomber walked into the Mogadishu mayor’s office and detonated his explosives. Somali officials were meeting with the UN Special Envoy to Somalia, James Swan, prior to the attack.

According to the Associated Press, however, Swan and many others had left the building just minutes before the suicide bomber arrived. Other Somali officials were not as lucky, including Mogadishu’s mayor, who was reportedly rushed to a hospital in critical condition.

Big Cable Owns Internet Access. Here’s How to Change That.

Surveying the landscape of internet access, one could be forgiven for a single dank conclusion: Winter is coming.

We know that Big Cable’s plan for high-speed internet access is to squeeze with “usage-based billing” and data caps, so as to milk ever-growing profits from their existing networks rather than invest in future-proof fiber optics. We’re also seeing that Big Cable has won the war for high-capacity, 25Mbps-download-or-better wired internet access, leaving AT&T and Verizon to concentrate primarily on mobile wireless. Indeed, Big Cable’s share of new and existing wired-access subscribers has never been greater — cable got both all new net subscribers in the third quarter of 2015 and captured millions of subscribers fleeing DSL — and its control over this market is growing faster than ever.

Wall Street analyst Craig Moffett predicts that, in the end, unless things change, cable will have 90 percent of subscribers in areas where it faces competition from only traditional DSL and will have the lion’s share of subscribers in areas where cable faces competition from souped-up copper-line DSL and fiber-to-the-node (aka “fiber to the neighborhood”).

We’re already seeing the deadening effects of this. Pew reports that home adoption of high-speed internet access has plateaued, while the percentage of smartphone-only users in the United States is growing. Just 8 percent of Americans were smartphone only in 2013. That number is now 13 percent—mostly lower-income households, minorities, and rural Americans. What’s the reason for nonadoption? Mostly cost: The monthly fee for high-speed internet is the main reason most of these people don’t have access at home. Smartphone-only users just don’t have same the quality of access as home high-speed internet subscribers. We are amplifying and entrenching existing inequality by not taking on this country’s internet access problem.

Islamic State fighters number far more than first thought, says CIA

US officials are shocked at the “Islamic State’s rapid growth.” Now, the CIA estimates that the Islamic State has somewhere between 20,000 to 31,500 fighters within its ranks. That number may include “some 15,000 foreign fighters in Syria alone, including 2,000 Westerners,” Al Jazeera reported, which noted the estimate is “far more than first thought.”

Islamic State fighters in Iraq and Syria number around 20,000 to 31,500 — a figure far higher than previously estimated, the Central Intelligence Agency has said.The new calculation includes some 15,000 foreign fighters in Syria alone, including 2,000 Westerners, a U.S. intelligence official told the AFP news agency on Thursday.

“The number is much higher than a previous estimate of 10,000,” Al Jazeera continues.

The scope of the operation, including the territory covered, indicates that tens of thousands of ISIS fighters participated in the recent fighting. The group is estimated to have anywhere around 50,000 members, thousands of foreign fighters and is more of an army rather than a smaller extremist group.

What’s the matter with PGP?

Last Thursday, Yahoo announced their plans to support end-to-end encryption using a fork of Google’s end-to-end email extensionThis is a Big Deal. With providers like Google and Yahoo onboard, email encryption is bound to get a big kick in the ass. This is something email badly needs.

So great work by Google and Yahoo! Which is why following complaint is going to seem awfully ungrateful. I realize this and I couldn’t feel worse about it.

As transparent and user-friendly as the new email extensions are, they’re fundamentally just re-implementations of OpenPGP — and non-legacy-compatible ones, too. The problem with this is that, for all the good PGP has done in the past, it’s a model of email encryption that’s fundamentally broken. It’s time for PGP to die.

In the remainder of this post I’m going to explain why this is so, what it means for the future of email encryption, and some of the things we should do about it. Nothing I’m going to say here will surprise anyone who’s familiar with the technology — in fact, this will barely be a technical post. That’s because, fundamentally, most of the problems with email encryption aren’t hyper-technical problems. They’re still baked into the cake.

How the U.S. Could Escalate Its Name-and-Shame Campaign Against China’s Espionage

Chinese companies believed to be benefiting from stolen secrets could be the next target of U.S. action to curb industrial espionage.

Earlier this week the U.S. Department of Justice indicted five Chinese military officers for industrial espionage, accusing them of leading attacks on the computers of U.S. companies including U.S. Steel and Westinghouse to gather material to be passed on to Chinese companies.

The move puts U.S. policy in line with experts who have argued that only naming and shaming the perpetrators, and pursuing them through legal action, will rein in such attacks. Digital IP theft is now normal for U.S companies, although few victims disclose the fact.

Dmitri Alperovitch, cofounder and chief technology officer (see “TR35: Dmitri Alperovitch”) of the security company Crowdstrike, a company that offers new ways to trace and fight back against cyberattacks, told MIT Technology Review’s Tom Simonite how the U.S. could use its new strategy to increase the pressure on China even further.