Connect with us

Science & Technology

Go Home, Occupy Movement!!

Published

on

Ever since, years ago, I coined the expression “McFB way of life” and particularly since my intriguing FB articles (Is there life after Facebook I and II) have been published, I was confronted with numerous requests to clarify the meaning. My usual answer was a contra-question: If humans hardly ever question fetishisation or oppose the (self-) trivialization, why then is the subsequent brutalization a surprise to them?

Not pretending to reveal a coherent theory, the following lines are my instructive findings, most of all on the issue why it is time to go home, de-pirate, and search for a silence.  

Largely drawing on the works of the grand philosophers of the German Classicism and Dialectic Materialism, it was sociologist Max Weber who was the first – among modern age thinkers – to note that the industrialized world is undergoing a rapid process of rationalization of its state (and other vital societal) institutions. This process – Weber points out – is charac-terized by an increased efficiency, predictability, calculability, and control over any ‘threat’ of uncertainty. Hereby, the uncertainty should be understood in relation to the historically unstable precognitive and cognitive human, individual and group, dynamics. A disheartened, cold and calculative over-rationalization might lead to obscurity of irrationality, Weber warns. His famous metaphor of the iron cage or irrationality of rationality refers to his concern that an extremely rationalized (public) institution inevitably alienates itself and turns dehumanized to both, those who staff them and those they serve, with a tiny upper caste of controllers steadily losing touch of reality.

Revisiting, rethinking and rejuvenating Weber’s theory (but also those of Sartre, Heidegger, Lukács, Lefebvre, Horkheimer, Marcuse and Bloch), it was the US sociologist George Ritzer who postulated that the late 20th century institutions are rationalized to a degree that the entire state becomes ‘McDonaldized’, since the principles of the fast food industry have gradually pervaded other segments of society and very aspects of life (The McDonaldization of Society, a controversial and highly inspiring book of popular language, written in 1993).

Thus paraphrased, Ritzer states that (i) McEfficiency is achieved by the systematic elimination of unnecessary time or effort in pursuing an objective. As the economy has to be just-in-time competitively productive, society has to be efficient as well. Corresponding to this mantra, only a society whose forms and contents are governed by business models, whose sociability runs on marketing principles is a successfully optimized polity. Premium efficiency in the workplace (or over broader aspects of sociableness) is attainable by introducing F.W. Taylor’s and H. Ford’s assembly line into human resources and their intellectual activity (sort of intellectual assembly line).  Even an average daily exposure to the so-called news and headlines serves an instructive and directional rather than any informational and exploratory purpose. Hence, McEfficiency solidifies the system, protecting its karma and dharma from any spontaneity, digression, unnecessary questioning and experimenting or surprise.

(ii) McCalculability is an attempt to measure quality in terms of quantity, whereby quality becomes secondary, if at all a concern. The IT sector, along with the search engines and cyber -social clubs, has considerably contributed to the growing emphasis on calculability. Not only the fast food chains (1 billion meals, everybody-served-in-a-minute), Google, Facebook, TV Reality Shows, and the like, as well as the universities, hospitals, travel agencies – all operate on a nearly fetishised and worshiped ‘most voted’, ‘frequently visited’,‘most popular’, a big is beautiful, matrix. It is a calculability which mystically assures us that the BigMac is always the best meal – given its quantity; that the best reader is always a bestseller book; and that the best song is a tune with the most clicks on YouTube. One of the most wanted air carriers, AirAsia, has a slogan: Everyone can fly now. In the world where everyone is armed with mobile-launcher gadgets powered by the micro-touch, soft-screen & scream tech to add to the noisy cacophony – amount, size, frequency, length and volume is all what matters. Thus, a number, a pure digit becomes the (Burger) king. Long Yahoo, the king! Many of my students admitted to me that Google for them is more than a search engine; that actually googalization is a well-domesticated method, which considerably and frequently replaces the cognitive selection when preparing their assignments and exams. Ergo, instead of complementing, this k(l)icky-Wiki-picky method increasingly substitutes the process of human reasoning.

(iii) McPredictability is the key factor of the rationalized McDonalds process. On the broader scale, a rational (rationally optimized) society is one in which people know well beforehand what (and when) to expect. Hence, fast food is always mediocre – it never tastes very bad or very good. The parameter of McFood is therefore a surprise-less world in which equally both disappointment and delight are considerably absent. McMeals will always blend uniform preparation and contents, as well as the standardized serving staff outfit and their customized approach. In the end, it is not about food at all. What makes McDonalds so durably popular is a size, numbers and predictability. (All three are proportionately and causally objectivized and optimized: a meal, who serves it and those served – until the locality and substance of each of the three becomes fluid, obsolete and irrelevant. And what would symbolize this relativization and /self-/trivialization better than a clown – well-known mascot Ronald of McDonaldland). In such an atmosphere of predictability or better to say predictive seduction and gradual loss of integrity, the culture of tacit obedience (ignorance of self-irrelevance through the corrosive addiction) is breeding, even unspotted. Consequently, more similarities than differences is the central to a question of predictability, on both ends: demand (expectation, possibility) and supply (determination, probability). No wonder that even the Pirates offer just a routinized protests under only one simplified and uniformed, ‘anonymous’ mask for all.

(iv) McControl represents the fourth and final Weberian aspect for Ritzer. Traditionally (ever since the age of cognitivity), humans are the most unpredictable element, a variable for the rationalized, bureaucratic systems, so it is an imperative for the McOrganization to (pacify through) control. Nowadays, technology offers a variety of palliatives and tools for the effective control of both employers (supply, probability) and customers (demand, possibility), as well as to control the controllers. A self-articulation, indigenous opinionation, spontaneous initiative and unconstrained action is rather simulated, yet stimulated very seldom. Only once the wide spectrum of possibilities is quietly narrowed down, a limited field of probabilities will appear so large. To this end, the IT appliances are very convenient (cheap, discreet and invisible, but omnipresent and highly accurate) as they compute, pre-decide, channel and filter moves, as well as they store and analyze behavior patterns with their heartless algorithms. (The ongoing SOPA, PIPA and ACTA fuss or any other rendering stringent regulative in future does not constitute, but only confirms and supplements its very cyber nature.)

Aided by the instruments of efficiency, calculability and predictability, the control eliminates (the premium or at least minimizes any serious impact of) authenticity, autonomous thinking and independent (non-consumerist) judgment. Depth and frequency of critical insights and of unpredictable human actions driven by unexpected conclusions is rationalized to a beforehand calculable, and therefore tolerable few. Hyper-rationalized, frigid-exercised, ultra-efficient, predictable and controlled environment subscribes also a full coherence to the socio-asymmetric and dysfunctional-emphatic atmosphere of disaffected but ultimately obedient subjects (‘guided without force’, ‘prompted without aim’, “poked, tweeted & fleshmobbed for ‘fun”, ‘useful idiots’, ‘fitting the social machine without friction’). Hence, what is welcomed is not an engagement, but compliance: a self-actualization through exploration challenges while consumerism confirms – status quo. Veneration of nullity!

Ergo, the final McSociety product is a highly efficient, predictable, computed, standardized, typified, instant, unison, routinized, addictive, imitative and controlled environment which is – paradoxically enough – mystified through the worshiping glorification (of scale). Subjects of such a society are fetishising the system and trivializing their own contents – smooth and nearly unnoticed trade-off. When aided by the IT in a mass, unselectively frequent and severe use within the scenery of huge shopping malls (enveloped by a consumerist fever and spiced  up by an ever larger cyber-neurosis, disillusional and psychosomatic disorders, and functional illiteracy of misinformed, undereducated, cyber-autistic and egotistic under-aged and hardly-aged individuals – all caused by the constant (in)flow of clusters of addictive alerts on diver-ting banalities), it is an environment which epitomizes what I coined as the McFB way of life.

This is a cyber–iron cage habitat: a shiny but directional and instrumented, egotistic and autistic, cold and brutal place; incapable of vision, empathy, initiative or action. It only accelerates our disconnection with a selfhood and the rest. If and while so, is there any difference between Gulag and Goo(g)lag – as both being prisons of free mind? Contrary to the established rhetoric; courage, solidarity, vision and initiative were far more monitored, restricted, stigmatized and prosecuted than enhanced, supported and promoted throughout the human history – as they’ve been traditionally perceived like a threat to the inaugurated order, a challenge to the functioning status quo, defiant to the dogmatic conscripts of admitted, permissible, advertized, routinized, recognized and prescribed social conduct.

Elaborating on a well known argument of ‘defensive modernization’ of Fukuyama, it is to state that throughout the entire human history a technological drive was aimed to satisfy the security (and control) objective; and it was rarely (if at all) driven by a desire to (enlarge the variable and to) ease human existence or to enhance human emancipation and liberation of societies at large. Thus, unless operationalized by the system, both intellectualism (human autonomy, mastery and purpose), and technological breakthroughs were traditionally felt and perceived as a threat.  

Consequently, all cyber-social networks and related search engines are far away from what they are portrayed to be: a decentralized but unified intelligence, attracted by gravity of quality rather than navigated by force of a specific locality. In fact, they primarily serve the predictability, efficiency, calculability and control purpose, and only then they serve everything else – as to be e.g. user-friendly and en mass service attractive. To observe the new corrosive dynamics of social phenomenology between manipulative fetishisation (probability) and self-trivialization (possibility), the cyber-social platforms – these dustbins of human empathy in the muddy suburbs of consciousness – are particularly interesting.   

Facebook itself is a perfect example of how to utilize (to simulate, instead of to stimulate and empathically live) human contents. Its toolkit offers efficient, rationalized, predictable, clean, transparent, and most intriguing of all, very user-friendly convenient reduction of all possible relations between two individuals: ‘friend’, ‘no-friend’. It sets a universally popular language, so standardized and uncomplicated that even any anonymous machine can understand it – a binary code: ‘1’ (friend) ‘0’ (no-friend), or eventually ‘1’ (brother/sister), ‘1/0’ (friend), ‘0’ no-friend – just two digits to feed precise algorithmic calculations. Remember, number is the king. Gott ist tot, dear Nietzsche – so are men.

Be it occupied or besieged, McDonalds will keep up its menu. Instead, we should finally occupy ourselves by de-pirating enormous tweet/mob noise pollution in and all around us.    It is a high time to replace the dis-conceptual flux on streets for a silent reflection at home.
Sorry Garcin, hell is not other people. Hell are we!!

Post Scriptum:

In his emotionally charged speech of December 2011, President Obama openly warned the US citizens: “Inequality distorts our democracy. It gives an outsized voice to the few who can afford high-priced lobbyists (…) the wealthiest Americans are paying the lowest taxes in over half a century (…) Some billionaires have a tax rate as low as 1%. One per cent! (…) The free market has never been a free license to take whatever you want from whoever you can…”
(The Oswatomie High School, Kansas, 06 December 2011, the While House Press Release).

Two months before that speech, the highly respected, politically balanced and bipartisan Budget Office of the US Congress (CBO) released its own study “Trends in the Distribution of Household Income between 1979 and 2007” (October 2011). The CBO finds that, between 1979 and 2007, income grew by: 275% for the top 1% of the US households, 65% increase for the next 19% of households, less than a 40% increase for the following segment of households of the next 60%, and finally only an 18% income increase for the bottom of 20% of the US households. If we consider an inflation for the examined period of nearly 30 years, then the nominal growth would turn to a negative increase in real incomes for almost 80% of the US households; a single digit real income increase for the upper 19% of households; and still a three-digit income growth for the top 1% of population.    

According to the available internet search engine counters, this CBO study has been retrieved 74,000 times since posted some 3 months ago. For the sake of comparison, an average clip of great-granddaughter of ultra-rich, billionaire Conrad Hilton is clicked on YouTube over 31 million times. Roughly 3 million Americans would represent the top 1% of its population. Who are other 99% – pardon, 28 million individuals – interested in trivial clip/s (with obscure but explicit lines: They can’t do this to me, I’m rich) of Miss Paris?

Remember what I asked at the beginning of this article: If humans hardly ever question fetishisation or oppose the (self-) trivialization, why then is the subsequent brutalization a surprise to them?

*  This is the so-called FB3 article (Is there life after Facebook? III – the Cyber Goo(g)lag Revelations). Its early version was first published by the US Journal of Foreign Relations /12 January 2012/.

References:

1.    Weber, M. (1951), Wirtschaft und Gesellschaft – Grundriss der verstehenden Sociologie (Economy and Society), Tübingen, J.C.B. Mohr (Paul Siebeck)
2.    Ritzer, G. (1993), The McDonaldization of Society: An Investigation into the Changing Character of Contemporary Social Life, Thousand Oaks, CA: Pine Forge Press
3.    Zappa, F.V. (1989), The Real Frank Zappa Book, Touchstone (1999 Edition)
4.    Schlitz, M. (1998), On consciousness, causation and evolution, Journal of Parapsychology (61: 185-96)   
5.    Fukuyama, F. (2002), Our Posthuman Future – Consequences of the Biotech Revolution, Profile Books, London (page: 126/232)
6.    Bajrektarevic, A. (2004), Environmental Ethics – Four Societal Normative Orders, Lectures/Students Reader, Vienna (IMC University Krems), Austria
7.    Mumford, L. (1967), Technics and Human Development – Myth of the Machine (Vol. 1), Mariner Books (Ed. 1971)  
8.    McTaggart, L. (2001), The Field, HarperCollins Publishers

Modern Diplomacy Advisory Board, Chairman Geopolitics of Energy Editorial Member Professor and Chairperson for Intl. Law & Global Pol. Studies contact: anis@bajrektarevic.eu

Continue Reading
Comments

Science & Technology

At Last A Malaria Vaccine and How It All Began

Published

on

A health worker vaccinates a man against the Ebola virus in Beni, eastern Democratic Republic of the Congo. (file photo) World Bank/Vincent Tremeau

This week marked a signal achievement.  A group from Oxford University announced the first acceptable vaccine ever against malaria.  One might be forgiven for wondering why it has taken so long when the covid-19 vaccines have taken just over a year … even whether it is a kind of economic apartheid given that malaria victims reside in the poorest countries of the world.

It turns out that the difficulties of making a malaria vaccine have been due to the complexity of the pathogen itself.  The malarial parasite has thousands of genes; by way of comparison, the coronavirus has about a dozen.  It means malaria requires a very high immune response to fight it off.  

A trial of the vaccine in Burkina Faso has yielded an efficacy of 77 percent for subjects given a high dose and 71 percent for the low-dose recipients.  The World Health Organization (WHO) had specified a goal of 75 percent for effective deployment in the population.  A previous vaccine demonstrated only 55 percent effectiveness.  The seriousness of the disease can be ascertained from the statistics.  In 2019, 229 million new malaria infections were recorded and 409 thousand people died.  Moreover, many who recover can be severely debilitated by recurring bouts of the disease.

Vaccination has an interesting history.  The story begins with Edward Jenner.  A country doctor with a keen and questioning mind, he had observed smallpox as a deadly and ravaging disease.  He also noticed that milkmaids never seemed to get it.  However, they had all had cowpox, a mild variant which at some time or another they would have caught from the cows they milked.

It was 1796 and Jenner desperate for a smallpox cure followed up his theory, of which he was now quite certain, with an experiment.  On May14, 1796 Jenner inoculated James Phipps, the eight-year-old son of Jenner’s gardener.  He used scraped pus from cowpox blisters on the hands of Sarah Nelmes, a milkmaid who had caught cowpox from a cow named Blossom.  Blossom’s hide now hangs in the library of St. George’s Hospital, Jenner’s alma mater. 

Phipps was inoculated on both arms with the cowpox material.  The result was a mild fever but nothing serious.  Next he inoculated Phipps with variolous material, a weakened form of smallpox bacteria often dried from powdered scabs.  No disease followed, even on repetition.  He followed this experiment with 23 additional subjects (for a round two dozen) with the same result.  They were all immune to smallpox.  Then he wrote about it. 

Not new to science, Edward Jenner had earlier published a careful study of the cuckoo and its habit of laying its eggs in others’ nests.  He observed how the newly hatched cuckoo pushed hatchlings and other eggs out of the nest.  The study was published resulting in his election as a Fellow of the Royal Society.  He was therefore well-suited to spread the word about immunization against smallpox through vaccination with cowpox. 

Truth be told, inoculation was not new.  People who had traveled to Constantinople reported on its use by Ottoman physicians.  And around Jenner’s time, there was a certain Johnny Notions, a self-taught healer, who used it in the Shetland Isles then being devastated by a smallpox epidemic.  Others had even used cowpox earlier.  But Jenner was able to rationally formalize and explain the procedure and to continue his efforts even though The Royal Society did not accept his initial paper.  Persistence pays and finally even Napoleon, with whom Britain was at war, awarded him a medal and had his own troops vaccinated. 

Continue Reading

Science & Technology

The Dark Ghosts of Technology

Published

on

Last many decades, if accidently, we missed the boat on understanding equality, diversity and tolerance, nevertheless,  how obediently and intentionally we worshiped the technology no matter how dark or destructive a shape it morphed into; slaved to ‘dark-technology’ our faith remained untarnished and faith fortified that it will lead us as a smarter and successful nation.

How wrong can we get, how long in the spell, will we ever find ourselves again?

The dumb and dumber state of affairs; extreme and out of control technology has taken human-performances on ‘real-value-creation’ as hostage, crypto-corruption has overtaken economies, shiny chandeliers now only cast giant shadows, tribalism nurturing populism and  socio-economic-gibberish on social media narratives now as new intellectualism.

Only the mind is where critical thinking resides, not in some app.   

The most obvious missing link, is theabandonment of own deeper thinking. By ignoring critical thinking, and comfortably accepting our own programming, labeled as ‘artificial intelligence’ forgetting in AI there is nothing artificial just our own ‘ignorance’ repackaged and branded.  AI is not some runaway train; there is always a human-driver in the engine room, go check. When ‘mechanized-programming, sensationalized by Hollywood as ‘celestially-gifted-artificial-intelligence’ now corrupting global populace in assuming somehow we are in safe hands of some bionic era of robotized smartness. All designed and suited to sell undefined glittering crypto-economies under complex jargon with illusions of great progress. The shiny towers of glittering cities are already drowning in their own tent-cities.

A century ago, knowing how to use a pencil sharpener, stapler or a filing cabinet got us a job, today with 100+ miscellaneous, business or technology related items, little or nothing considered as big value-added gainers. Nevertheless, Covidians, the survivors of the covid-19 cruelties now like regimented disciples all lining up at the gates.  There never ever was such a universal gateway to a common frontier or such massive assembly of the largest mindshare in human history.

Some of the harsh lessons acquired while gasping during the pandemic were to isolate techno-logy with brain-ology.  Humankind needs humankind solutions, where progress is measured based on common goods. Humans will never be bulldozers but will move mountains. Without mind, we become just broken bodies, in desperate search for viagra-sunrises, cannabis-high-afternoons and opioid-sunsets dreaming of helicopter-monies.

Needed more is the mental-infrastructuring to cope with platform economies of global-age and not necessarily cemented-infrastructuring to manage railway crossings. The new world already left the station a while ago. Chase the brain, not the train.  How will all this new thinking affect the global populace and upcoming of 100 new National Elections, scheduled over the next 500 days? The world of Covidians is in one boat; the commonality of problems bringing them closer on key issues.

Newspapers across the world dying; finally, world-maps becoming mandatory readings of the day

Smart leadership must develop smart economies to create the real ‘need’ of the human mind and not just jobs, later rejected only as obsolete against robotization. Across the world, damaged economies are visible. Lack of pragmatic support to small medium businesses, micro-mega exports, mini-micro-manufacturing, upskilling, and reskilling of national citizenry are all clear measurements pointing as national failures. Unlimited rainfall of money will not save us, but the respectable national occupationalism will.  Study ‘population-rich-nations’ and new entrapments of ‘knowledge-rich-nations’ on Google and also join Expothon Worldwide on ‘global debate series’ on such topics.

Emergency meetings required; before relief funding expires, get ready with the fastest methodologies to create national occupationalism, at any costs, or prepare for fast waves of populism surrounded by almost broken systems. Bold nations need smart play; national debates and discussions on common sense ideas to create local grassroots prosperity and national mobilization of hidden talents of the citizenry to stand up to the global standard of competitive productivity of national goods and services.

The rest is easy

Continue Reading

Science & Technology

China and AI needs in the security field

Published

on

On the afternoon of December 11, 2020, the Political Bureau of the Central Committee of the Communist Party of China (CPC) held the 26th Collective Study Session devoted to national security. On that occasion, the General Secretary of the CPC Central Committee, Xi Jinping, stressed that the national security work was very important in the Party’s management of State affairs, as well as in ensuring that the country was prosperous and people lived in peace.

In view of strengthening national security, China needs to adhere to the general concept of national security; to seize and make good use of an important and propitious period at strategic level for the country’s development; to integrate national security into all aspects of the CPC and State’s activity and consider it in planning economic and social development. In other words, it needs to builda security model in view of promoting international security and world peace and offering strong guarantees for the construction of a modern socialist country.

In this regard, a new cycle of AI-driven technological revolution and industrial transformation is on the rise in the Middle Empire. Driven by new theories and technologies such as the Internet, mobile phone services, big data, supercomputing, sensor networks and brain science, AI offers new capabilities and functionalities such as cross-sectoral integration, human-machine collaboration, open intelligence and autonomous control. Economic development, social progress, global governance and other aspects have a major and far-reaching impact.

In recent years, China has deepened the AI significance and development prospects in many important fields. Accelerating the development of a new AI generation is an important strategic starting point for rising up to the challenge of global technological competition.

What is the current state of AI development in China? How are the current development trends? How will the safe, orderly and healthy development of the industry be oriented and led in the future?

The current gap between AI development and the international advanced level is not very wide, but the quality of enterprises must be “matched” with their quantity. For this reason, efforts are being made to expand application scenarios, by enhancing data and algorithm security.

The concept of third-generation AI is already advancing and progressing and there are hopes of solving the security problem through technical means other than policies and regulations-i.e. other than mere talk.

AI is a driving force for the new stages of technological revolution and industrial transformation. Accelerating the development of a new AI generation is a strategic issue for China to seize new opportunities in the organisation of industrial transformation.

It is commonly argued that AI has gone through two generations so far. AI1 is based on knowledge, also known as “symbolism”, while AI2 is based on data, big data, and their “deep learning”.

AI began to be developed in the 1950s with the famous Test of Alan Turing (1912-54), and in 1978 the first studies on AI started in China. In AI1, however, its progress was relatively small. The real progress has mainly been made over the last 20 years – hence AI2.

AI is known for the traditional information industry, typically Internet companies. This has acquired and accumulated a large number of users in the development process, and has then established corresponding patterns or profiles based on these acquisitions, i.e. the so-called “knowledge graph of user preferences”. Taking the delivery of some products as an example, tens or even hundreds of millions of data consisting of users’ and dealers’ positions, as well as information about the location of potential buyers, are incorporated into a database and then matched and optimised through AI algorithms: all this obviously enhances the efficacy of trade and the speed of delivery.

By upgrading traditional industries in this way, great benefits have been achieved. China is leading the way and is in the forefront in this respect: facial recognition, smart speakers, intelligent customer service, etc. In recent years, not only has an increasing number of companies started to apply AI, but AI itself has also become one of the professional directions about which candidates in university entrance exams are worried.

According to statistics, there are 40 AI companies in the world with a turnover of over one billion dollars, 20 of them in the United States and as many as 15 in China. In quantitative terms, China is firmly ranking second. It should be noted, however, that although these companies have high ratings, their profitability is still limited and most of them may even be loss-making.

The core AI sector should be independent of the information industry, but should increasingly open up to transport, medicine, urban fabric and industries led independently by AI technology. These sectors are already being developed in China.

China accounts for over a third of the world’s AI start-ups. And although the quantity is high, the quality still needs to be improved. First of all, the application scenarios are limited. Besides facial recognition, security, etc., other fields are not easy to use and are exposed to risks such as 1) data insecurity and 2) algorithm insecurity. These two aspects are currently the main factors limiting the development of the AI industry, which is in danger of being prey to hackers of known origin.

With regard to data insecurity, we know that the effect of AI applications depends to a large extent on data quality, which entails security problems such as the loss of privacy (i.e. State security). If the problem of privacy protection is not solved, the AI industry cannot develop in a healthy way, as it would be working for ‘unknown’ third parties.

When we log into a webpage and we are told that the most important thing for them is the surfers’ privacy, this is a lie as even teenage hackers know programs to violate it: at least China tells us about the laughableness of such politically correct statements.

The second important issue is the algorithm insecurity. The so-called insecure algorithm is a model that is used under specific conditions and will not work if the conditions are different. This is also called unrobustness, i.e. the algorithm vulnerability to the test environment.

Taking autonomous driving as an example, it is impossible to consider all scenarios during AI training and to deal with new emergencies when unexpected events occur. At the same time, this vulnerability also makes AI systems permeable to attacks, deception and frauds.

The problem of security in AI does not lie in politicians’ empty speeches and words, but needs to be solved from a technical viewpoint. This distinction is at the basis of AI3.

It has a development path that combines the first generation knowledge-based AI and the second generation data-driven AI. It uses the four elements – knowledge, data, algorithms and computing power – to establish a new theory and interpretable and robust methods for a safe, credible and reliable technology.

At the moment, the AI2 characterised by deep learning is still in a phase of growth and hence the question arises whether the industry can accept the concept of AI3 development.

As seen above, AI has been developing for over 70 years and now it seems to be a “prologue’.

Currently most people are not able to accept the concept of AI3 because everybody was hoping for further advances and steps forward in AI2. Everybody felt that AI could continue to develop by relying on learning and not on processing. The first steps of AI3 in China took place in early 2015 and in 2018.

The AI3 has to solve security problems from a technical viewpoint. Specifically, the approach consists in combining knowledge and data. Some related research has been carried out in China over the past four or five years and the results have also been applied at industrial level. The RealSecure data security platform and the RealSafe algorithm security platform are direct evidence of these successes.

What needs to be emphasised is that these activities can only solve particular security problems in specific circumstances. In other words, the problem of AI security has not yet found a fundamental solution, and it is likely to become a long-lasting topic without a definitive solution since – just to use a metaphor – once the lock is found, there is always an expert burglar. In the future, the field of AI security will be in a state of ongoing confrontation between external offence and internal defence – hence algorithms must be updated constantly and continuously.

The progression of AI3 will be a natural long-term process. Fortunately, however, there is an important AI characteristic – i.e. that every result put on the table always has great application value. This is also one of the important reasons why all countries attach great importance to AI development, as their national interest and real independence are at stake.

With changes taking place around the world and a global economy in deep recession due to Covid-19, the upcoming 14th Five-Year Plan (2021-25) of the People’s Republic of China will be the roadmap for achieving the country’s development goals in the midst of global turmoil.

As AI is included in the aforementioned plan, its development shall also tackle many “security bottlenecks”. Firstly, there is a wide gap in the innovation and application of AI in the field of network security, and many scenarios are still at the stage of academic exploration and research.

Secondly, AI itself lacks a systematic security assessment and there are severe risks in all software and hardware aspects. Furthermore, the research and innovation environment on AI security is not yet at its peak and the relevant Chinese domestic industry not yet at the top position, seeking more experience.

Since 2017, in response to the AI3 Development Plan issued by the State Council, 15 Ministries and Commissions including the Ministry of Science and Technology, the Development and Reform Commission, etc. have jointly established an innovation platform. This platform is made up of leading companies in the industry, focusing on open innovation in the AI segment.

At present, thanks to this platform, many achievements have been made in the field of security. As first team in the world to conduct research on AI infrastructure from a system implementation perspective, over 100 vulnerabilities have been found in the main machine learning frameworks and dependent components in China.

The number of vulnerabilities make Chinese researchers rank first in the world. At the same time, a future innovation plan -developed and released to open tens of billions of security big data – is being studied to promote the solution to those problems that need continuous updates.

The government’s working report promotes academic cooperation and pushes industry and universities to conduct innovative research into three aspects: a) AI algorithm security comparison; 2) AI infrastructure security detection; 3) AI applications in key cyberspace security scenarios.

By means of state-of-the-art theoretical and basic research, we also need to provide technical reserves for the construction of basic AI hardware and open source software platforms (i.e. programmes that are not protected by copyright and can be freely modified by users) and AI security detection platforms, so as to reduce the risks inherent in AI security technology and ensure the healthy development of AI itself.

With specific reference to security, on March 23 it was announced that the Chinese and Russian Foreign Ministers had signed a joint statement on various current global governance issues.

The statement stresses that the continued spread of the Covid-19 pandemic has accelerated the evolution of the international scene, has caused a further imbalance in the global governance system and has affected the process of economic development while new global threats and challenges have emerged one after another and the world has entered a period of turbulent changes. The statement appeals to the international community to put aside differences, build consensus, strengthen coordination, preserve world peace and geostrategic stability, as well as promote the building of a more equitable, democratic and rational multipolar international order.

In view of ensuring all this, the independence enshrined by international law is obviously not enough, nor is the possession of nuclear deterrent. What is needed, instead, is the country’s absolute control of information security, which in turn orients and directs the weapon systems, the remote control of which is the greedy prey to the usual suspects.

Continue Reading

Publications

Latest

Trending