Connect with us

Science & Technology

Twinning Europe and Asia in Cyberspace

Published

on

Authors: Prof. Melda Kamil Ariadno and Prof. Anis H Bajrektarevic

While our troposphere is dangerously polluted, one other space – that of intangible world, created by the interconnected technology– follows the same pattern: a cyberspace. Additionally, our cyberspace becomes increasingly brutalised by its rapid monetisation and weaponisation. It mainly occurs through privacy erosion. How to protect effectively individuals and their fundamental human rights, and how to exercise a right for dignity and privacy?

The EU now offers a model legislation to its Member States, and by its transformative power (spill-over) to the similar supranational projects elsewhere (particularly ASEAN, but also the AU, OAS, SCO, SAARC, LAS, etc.), and the rest of  world.

Rules and regulations to protect personal data do not trigger many sympathies.         The corporate world sees it as an unnecessary deterrent; as a limit to their growth – more to pay and less or slower to yield, innovate and expand. Governments would traditionally wish the rules should apply to every societal stakeholder but themselves. And citizenry by large too frequently behave benevolent, nearly careless whether their data is harvested or safeguarded at all.

However, such legislation is needed today more than ever before. The latest round of technological advancements was rapid, global and uneven. No wonder that in the aftermath of the so-called IT-revolutions, our world suffers from technological asymmetries: assertive big corporations and omnipresent mighty governments on one side and ordinary citizenry on the other. Even in the most advanced democracies today – such as the EU, personal autonomy is at the huge risk: Everyday simple, almost trivial, choices such as what to read, which road to take, what to wear, eat, watch or listen are governed (or at least filtered) by algorithms that run deep under the surface of software and devices. Algoritmisation of ‘will’ is so corrosive and deep that users are mostly unaware of the magnitude to which daily data processing rules over their passions, drives and choices.

Clearly, technology of today serves not only a Weberian predictability imperative – to further rationalise society. It makes society less safe and its individuals less free.

Societies are yet to wake up to this (inconvenient) truth. In the internet age of mobile, global and instant communications, people tend to focus more on the ‘here-us-now’ trends: goods, services, and experiences that the IT offers. Individuals are less interested on the ways in which privacy is compromised by software, its originators and devices – all which became an unnoticed but indispensable part of modern life. Despite a wish of many to grasp and know how data processing and harvesting affects them, population at large yet has no appetite for details.

But, the trend is here to stay – a steady erosion of privacy: bigger quantities of data are harvested about larger number of persons on a daily, if not hourly basis. Corporations and the central state authorities want more data and are less shy in how they obtain and use it.

Prevention of the personal information misuse (PIM) —intended or not—is the main reason the European Union (EU)introduced the new set of provisions, as of May 2018. Hence, the General Data Protection Regulation (GDPR) – as the legislation is known – is an ambitious attempt to further regulate digital technology, especially in respect to the private data protection. It is of course in conformity with provisions of both the Universal and European Charter of Human Rights, which hold the protection of human dignity and privacy as an indispensable, fundamental human right.

The intention of legislator behind the GDPR is twofold: to regulate domestically as well as to inspire and galvanise internationally. The GDPR is meant to open a new chapter in the Internet’s history at home, while creating, at the same time, a roadmap for other state and corporate sector actors beyond the EU. The challenge is clear: to reconcile the rights of individuals to data protection with the legitimate interests of business and government.

For the rest of the world, the GDPR should be predictive, inspirational and eventually obligational. Lack of acting now could open a space for the abuse of power – be it for illegitimate corporate or authoritarian gains of the hidden societal actors. In such a negative scenario – on a long run – losers are all. Historically, victimisation of individuals (through constant suspension of liberties and freedoms) ends up in a state or corporate fascism, and that one in a self-destruction of society as whole.

COMPREHENSIVE LEGISLATION AS POWERFUL DETERRENT

The Internet age exposes individuals in an unprecedented ways to the domestic or foreign predatory forces. Everybody is tempted to participate in digital economy or digital social interaction. This cannot go without revealing personal information to large state or non-state entities of local or international workings. If the field is not regulated, the moment such information leaves its proprietor, it can be easily and cheaply stored, analysed, further disseminated and shared without any knowledge or consent of it originator.

So far, neither market forces nor the negative publicity has seriously hindered companies and governments from tapping on and abusing this immense power. Nothing but a bold and comprehensive legislation is efficient deterrent, which stops the worst misuse. Only the legal provisions to protect personal data may serve a purpose of special and general prevention:

Be it in case a local or transnational corporate greed, governmental negligent or malicious official, or the clandestine interaction of the two (such as unauthorised access to personal phone and Internet records, as well as the unverified or inaccurate health and related data used to deny person from its insurance, loan, or work).

While totally absent elsewhere, early European attempts to legislate a comprehensive regulatory system of personal data protection have tired its best. Still, the EU’s Data Protection Directive of 1995 was falling short on several deliverables. (It was partly due to early stage of internet development, when the future significance of cyberspace was impossible to fully grasp and anticipate). Hence, this instrument failed to comprehensively identify the wrongdoings it sought to prevent, pre-empt and mitigate. The 1995 text also suffered from a lack of (logical and legal) consistency when it came to directing and instructing the individual EU member states (EU MS) on how to domesticate data privacy and promulgate it the body of their respective national legislation. Finally, the GDPR solves both of these problems.

This instrument of 2018 clearly stipulates on discrimination combating (including the politically or religiously motived hate-contents), authentication-related identity theft, fraud, financial crime, reputational harm (social networks mobbing, harassments and intimidation). Moreover, the European Commission (EC) has stated that the GDPR will strengthen the MS economies by recovering people’s trust in the security and sincerity of digital commerce, which has suffered lately of a numerous high-profile data breaches and infringements.

However, the most important feature (and a legal impact) of the GDPR is its power of being a direct effect law. This means that individuals can invoke it before the MS courts without any reference to the positive national legislation. That guaranties both speed and integrity to this supranational instrument – no vocatioleagis and no unnecessary domestication of the instrument through national constituencies. Conclusively, the 2018 instrument is further strengthened by an extra-territorial reach – a notion that make is applicable to any entity that operates in the EU, even if entity is not physically situated in the EU.

This practically means that each entity, in every sector and of every size, which processes personal data of the EU citizens, must comply with the GDPR. It obliges governments and their services (of national or sub-national levels); health, insurance and bank institutes; variety of Internet and mobile telephony service providers; media outlets and other social data gathering enterprises; labour, educational and recreational entities – in short, any subject that collects digital information about individuals.

The GDPR further strengthens accountability principle. The state and commercial actors hold direct and objective responsibility for a personal data collecting, storing and processing (including its drain or dissemination). Clearly, this EU instrument strengthens the right for information privacy (as a part of elementary human right – right to privacy) by protecting individuals from misappropriation of their personal data fora harvesting, monetisation or (socio-political) weaponisation purpose.

Namely, the GDPR gives individuals the right to request a transfer of their personal data (account and history information)from one commercial entity to another (e.g. from one bank or phone provider to another). Another right is to request – at short notice and for an unspecified reason – the commercial enterprise to stop both the data collection and the marketing dissemination, or to demand clarification on a marketing methods and nature of services provided. This instrument also offers individuals the right to request that their personal data are deleted (being zipped and sent back to its proprietor beforehand) – as stipulated in art.17 (the right to be forgotten).

The GDPR calls upon all operating entities to hire a data protection officer as to ensure full compliance with the new rules. It also invites all data collecting entities to conduct impact assessments – in order to determine scope frequency, outreach and consequences of personal data harvesting and processing. (For example, if certain entity wished to introduce biometric authentication for its employees and visitors entering daily its premises, it would need at first to run an assessment – a study that answers on the necessity and impact of that new system as well as the exposures it creates and possible risk mitigation measures.)

The GDPR obliges every entity that gathers data to minimise amount and configuration of personal data they harvest, while maximizing the security of that data. (For instance, if the auto dealer or travel agency requires potential customers to fill out the form to request a price quote, the form can ask only for information relevant to the product or services in question.)

The new legislation also mandates data gathering entities to notify the authorities – without any delay – whenever they suspect or witness a personal data breach. Conclusively, the GDPR obliges entities to present the public with clean and through information about the personal data they harvest and process—and clearly why they do so.

On the sanction side, the GDPR supports the regulators with new enforcement tools, including the norm setting, monitoring of and enforcement of compliance. For a non-compliance, the instrument prescribes steep fines.

To answer adequately the accountability standards enacted by this EU legislation will certainly invite large data gathering entities to bear significant investments. However, for the sake of credibility outreach and efficiency, they will have stimuli to introduce the new procedures and systems within the EU, but also beyond – wherever their operations are present. Complementary to it, the GDPR stipulates that if an entity transfers personal data out of the EU, it must safeguard that the data is handled in the new location the same way like within the EU. By this simple but far-reaching and effective spill over notion, the standards embodied by the GDPR will be delivered to the rest of the world. Hence, this instrument is not (only) an inner code of conduct that brings an outer appeal; it is a self-evolving and self-replicating standard of behaviour for our common (digital) future.

ASEAN, INDO-PACIFIC, ASIA

It is obvious that the stipulations of the GDPR would serve well interests of Republic of Indonesia (RI). That is actually in line with a very spirit of the 1945 Constitution, which obliges the state to protect, educate and prosper the Indonesian people. This supreme state act clearly proclaims that the respecting individual personal data is resting upon the two principles of the Pancasila. Namely these of; Fair and Civilized Humanity. Mutual grant and observance of everyone’s elementary rights is an essence of freedom and overall advancement of society.

The government, with the mandate of its authority to protect the public (public trust doctrine), must manage the personal data fairly and accountably. The GDPR also encourages the formation of an independent personal data protection supervisory institution so that it can correct the policies and rules of the bureaucracy and state administration to act accordingly in managing the personal data of the population. Moreover, every democratic government should be more proactive in protecting society when comes to the management of the personal data of its residents.

Interestingly, the Indonesian legislation already has instruments that follow notion of the GDPR. Thus, the Law No. 11 on Information and Electronic Transactions of 2008 (by a letter of its article 2) emphasizes the principle of extra-territorial jurisdiction. (In this particular case, it is related to the cross-border transactions. Indonesia should always safeguard its national interests: the RI jurisdiction stretches on any legal action that apply in Indonesia and/or carried out by Indonesian citizens. But it also applies to legal actions carried out outside of Indonesian jurisdiction by Indonesian citizens or a foreigner legally residing in RI, or Indonesian legal entities and foreign legal entities that produce legal effects in Indonesia.

This of course assumes the very nature of a use of Information Technology for Electronic Information and Electronic Transactions, which can be cross-territorial and even universal. What is assumed by this Law as “harming the interests of Indonesia” goers beyond pure national economic interests, protecting strategic data, national dignity, defense and security, the state of sovereignty, citizens, and Indonesian legal entities.)

When comes to the Right to be Forgotten (Right for Privacy and Right for Dignity), Indonesia must see it as a principle of real protection that is in the best interests of data owners. Further on, such a right should be strengthened by the principle of ‘without undue delay’, as to avoid the administrative obligation to request a court decision to uphold the right. On a long run, it will surely benefit businesses far more than the personal data originators themselves.

LEADING BY EXAMPLE

In line with the Right to Portability Data elaborated by the GDPR, Indonesia also needs to closer examine the EU instruments. Hence, the EU Regulation No.910 / 2014 concerning electronic identification, authentication and trust services (eIDAS) offers an idea how to harmonize the provision of digital identity and personal data in realm of electronic communications.(Electronic identification and authentication is a technology process that has an economic value. Such a business opportunity should be reconciled with a safety and security standards when comes to use of and traffic with of personal data for commercial interests.)

Regarding security, Indonesia must immediately have a clear policy on Cryptography to protect personal data. Cryptography is a double-use process; it can be utilised for civilian purposes, but it can also be used for the vital national interests, such as defense and security. Therefore, privacy and cybersecurity protection is a complementary concept of protection. Holistic approach strengthens the both rights of individuals as well as protection of national interests, rather than it ever conflicts one over the other.

Finally, the ASEAN Declaration of Human Rights in its article 21 stipulates that the protection of personal data is elementary part of Privacy. As one of the founding members, a country that even hosts the Organisation’s HQ, Indonesia must observe the notions of this Human Rights Charter. That is the additional reason why RI has to lead by example.

The EU’s GDPR clearly encourages a paradigm shift within the public services and government administration services on national, subnational and supranational level for all the ASEAN member states. It is to respect the fundamental freedoms and liberties, a quality that will shield population from random and ill-motivated arbitrary judgments of individual rights under the pretext of public interest.

Indonesia and ASEAN can take a lot of learning from the dynamics of the EU’s regulation of GDPR and e-IDAS as to its own benefit – to foster its own security and to elevate a trust in regional e-commerce within the ASEAN economic zone. Since the ASEAN (if combined) is the 4th largest world economy, this is a call of future that already starts now. After all the EU and ASEAN – each from its side of Eurasia – are twin grand projects of necessity, passion and vision.

Naturally, for anyone outside, Indonesia and ASEAN are already seen as the world’s e-commerce hub, of pivotal importance far beyond the Asia-Pacific theatre.

Prof. Melda Kamil Ariadno (SH, LLM, PhD) is a Professor of International Law at the Faculty of Law Universitas Indonesia, Jakarta. She is currently the Dean of the Faculty of Law Universitas Indonesia and the Head of Center for Sustainable Ocean Policy. She obtained her bachelor’s degree from Universitas Indonesia in 1992. Then, she received both her LL.M. and Ph.D. from the University of Washington in 1995 and 2011, respectively. She has served as legal expert for several governmental bodies among others the Ministry of Marine Affairs and Fisheries.

Continue Reading
Comments

Science & Technology

At Last A Malaria Vaccine and How It All Began

Published

on

A health worker vaccinates a man against the Ebola virus in Beni, eastern Democratic Republic of the Congo. (file photo) World Bank/Vincent Tremeau

This week marked a signal achievement.  A group from Oxford University announced the first acceptable vaccine ever against malaria.  One might be forgiven for wondering why it has taken so long when the covid-19 vaccines have taken just over a year … even whether it is a kind of economic apartheid given that malaria victims reside in the poorest countries of the world.

It turns out that the difficulties of making a malaria vaccine have been due to the complexity of the pathogen itself.  The malarial parasite has thousands of genes; by way of comparison, the coronavirus has about a dozen.  It means malaria requires a very high immune response to fight it off.  

A trial of the vaccine in Burkina Faso has yielded an efficacy of 77 percent for subjects given a high dose and 71 percent for the low-dose recipients.  The World Health Organization (WHO) had specified a goal of 75 percent for effective deployment in the population.  A previous vaccine demonstrated only 55 percent effectiveness.  The seriousness of the disease can be ascertained from the statistics.  In 2019, 229 million new malaria infections were recorded and 409 thousand people died.  Moreover, many who recover can be severely debilitated by recurring bouts of the disease.

Vaccination has an interesting history.  The story begins with Edward Jenner.  A country doctor with a keen and questioning mind, he had observed smallpox as a deadly and ravaging disease.  He also noticed that milkmaids never seemed to get it.  However, they had all had cowpox, a mild variant which at some time or another they would have caught from the cows they milked.

It was 1796 and Jenner desperate for a smallpox cure followed up his theory, of which he was now quite certain, with an experiment.  On May14, 1796 Jenner inoculated James Phipps, the eight-year-old son of Jenner’s gardener.  He used scraped pus from cowpox blisters on the hands of Sarah Nelmes, a milkmaid who had caught cowpox from a cow named Blossom.  Blossom’s hide now hangs in the library of St. George’s Hospital, Jenner’s alma mater. 

Phipps was inoculated on both arms with the cowpox material.  The result was a mild fever but nothing serious.  Next he inoculated Phipps with variolous material, a weakened form of smallpox bacteria often dried from powdered scabs.  No disease followed, even on repetition.  He followed this experiment with 23 additional subjects (for a round two dozen) with the same result.  They were all immune to smallpox.  Then he wrote about it. 

Not new to science, Edward Jenner had earlier published a careful study of the cuckoo and its habit of laying its eggs in others’ nests.  He observed how the newly hatched cuckoo pushed hatchlings and other eggs out of the nest.  The study was published resulting in his election as a Fellow of the Royal Society.  He was therefore well-suited to spread the word about immunization against smallpox through vaccination with cowpox. 

Truth be told, inoculation was not new.  People who had traveled to Constantinople reported on its use by Ottoman physicians.  And around Jenner’s time, there was a certain Johnny Notions, a self-taught healer, who used it in the Shetland Isles then being devastated by a smallpox epidemic.  Others had even used cowpox earlier.  But Jenner was able to rationally formalize and explain the procedure and to continue his efforts even though The Royal Society did not accept his initial paper.  Persistence pays and finally even Napoleon, with whom Britain was at war, awarded him a medal and had his own troops vaccinated. 

Continue Reading

Science & Technology

The Dark Ghosts of Technology

Published

on

Last many decades, if accidently, we missed the boat on understanding equality, diversity and tolerance, nevertheless,  how obediently and intentionally we worshiped the technology no matter how dark or destructive a shape it morphed into; slaved to ‘dark-technology’ our faith remained untarnished and faith fortified that it will lead us as a smarter and successful nation.

How wrong can we get, how long in the spell, will we ever find ourselves again?

The dumb and dumber state of affairs; extreme and out of control technology has taken human-performances on ‘real-value-creation’ as hostage, crypto-corruption has overtaken economies, shiny chandeliers now only cast giant shadows, tribalism nurturing populism and  socio-economic-gibberish on social media narratives now as new intellectualism.

Only the mind is where critical thinking resides, not in some app.   

The most obvious missing link, is theabandonment of own deeper thinking. By ignoring critical thinking, and comfortably accepting our own programming, labeled as ‘artificial intelligence’ forgetting in AI there is nothing artificial just our own ‘ignorance’ repackaged and branded.  AI is not some runaway train; there is always a human-driver in the engine room, go check. When ‘mechanized-programming, sensationalized by Hollywood as ‘celestially-gifted-artificial-intelligence’ now corrupting global populace in assuming somehow we are in safe hands of some bionic era of robotized smartness. All designed and suited to sell undefined glittering crypto-economies under complex jargon with illusions of great progress. The shiny towers of glittering cities are already drowning in their own tent-cities.

A century ago, knowing how to use a pencil sharpener, stapler or a filing cabinet got us a job, today with 100+ miscellaneous, business or technology related items, little or nothing considered as big value-added gainers. Nevertheless, Covidians, the survivors of the covid-19 cruelties now like regimented disciples all lining up at the gates.  There never ever was such a universal gateway to a common frontier or such massive assembly of the largest mindshare in human history.

Some of the harsh lessons acquired while gasping during the pandemic were to isolate techno-logy with brain-ology.  Humankind needs humankind solutions, where progress is measured based on common goods. Humans will never be bulldozers but will move mountains. Without mind, we become just broken bodies, in desperate search for viagra-sunrises, cannabis-high-afternoons and opioid-sunsets dreaming of helicopter-monies.

Needed more is the mental-infrastructuring to cope with platform economies of global-age and not necessarily cemented-infrastructuring to manage railway crossings. The new world already left the station a while ago. Chase the brain, not the train.  How will all this new thinking affect the global populace and upcoming of 100 new National Elections, scheduled over the next 500 days? The world of Covidians is in one boat; the commonality of problems bringing them closer on key issues.

Newspapers across the world dying; finally, world-maps becoming mandatory readings of the day

Smart leadership must develop smart economies to create the real ‘need’ of the human mind and not just jobs, later rejected only as obsolete against robotization. Across the world, damaged economies are visible. Lack of pragmatic support to small medium businesses, micro-mega exports, mini-micro-manufacturing, upskilling, and reskilling of national citizenry are all clear measurements pointing as national failures. Unlimited rainfall of money will not save us, but the respectable national occupationalism will.  Study ‘population-rich-nations’ and new entrapments of ‘knowledge-rich-nations’ on Google and also join Expothon Worldwide on ‘global debate series’ on such topics.

Emergency meetings required; before relief funding expires, get ready with the fastest methodologies to create national occupationalism, at any costs, or prepare for fast waves of populism surrounded by almost broken systems. Bold nations need smart play; national debates and discussions on common sense ideas to create local grassroots prosperity and national mobilization of hidden talents of the citizenry to stand up to the global standard of competitive productivity of national goods and services.

The rest is easy

Continue Reading

Science & Technology

China and AI needs in the security field

Published

on

On the afternoon of December 11, 2020, the Political Bureau of the Central Committee of the Communist Party of China (CPC) held the 26th Collective Study Session devoted to national security. On that occasion, the General Secretary of the CPC Central Committee, Xi Jinping, stressed that the national security work was very important in the Party’s management of State affairs, as well as in ensuring that the country was prosperous and people lived in peace.

In view of strengthening national security, China needs to adhere to the general concept of national security; to seize and make good use of an important and propitious period at strategic level for the country’s development; to integrate national security into all aspects of the CPC and State’s activity and consider it in planning economic and social development. In other words, it needs to builda security model in view of promoting international security and world peace and offering strong guarantees for the construction of a modern socialist country.

In this regard, a new cycle of AI-driven technological revolution and industrial transformation is on the rise in the Middle Empire. Driven by new theories and technologies such as the Internet, mobile phone services, big data, supercomputing, sensor networks and brain science, AI offers new capabilities and functionalities such as cross-sectoral integration, human-machine collaboration, open intelligence and autonomous control. Economic development, social progress, global governance and other aspects have a major and far-reaching impact.

In recent years, China has deepened the AI significance and development prospects in many important fields. Accelerating the development of a new AI generation is an important strategic starting point for rising up to the challenge of global technological competition.

What is the current state of AI development in China? How are the current development trends? How will the safe, orderly and healthy development of the industry be oriented and led in the future?

The current gap between AI development and the international advanced level is not very wide, but the quality of enterprises must be “matched” with their quantity. For this reason, efforts are being made to expand application scenarios, by enhancing data and algorithm security.

The concept of third-generation AI is already advancing and progressing and there are hopes of solving the security problem through technical means other than policies and regulations-i.e. other than mere talk.

AI is a driving force for the new stages of technological revolution and industrial transformation. Accelerating the development of a new AI generation is a strategic issue for China to seize new opportunities in the organisation of industrial transformation.

It is commonly argued that AI has gone through two generations so far. AI1 is based on knowledge, also known as “symbolism”, while AI2 is based on data, big data, and their “deep learning”.

AI began to be developed in the 1950s with the famous Test of Alan Turing (1912-54), and in 1978 the first studies on AI started in China. In AI1, however, its progress was relatively small. The real progress has mainly been made over the last 20 years – hence AI2.

AI is known for the traditional information industry, typically Internet companies. This has acquired and accumulated a large number of users in the development process, and has then established corresponding patterns or profiles based on these acquisitions, i.e. the so-called “knowledge graph of user preferences”. Taking the delivery of some products as an example, tens or even hundreds of millions of data consisting of users’ and dealers’ positions, as well as information about the location of potential buyers, are incorporated into a database and then matched and optimised through AI algorithms: all this obviously enhances the efficacy of trade and the speed of delivery.

By upgrading traditional industries in this way, great benefits have been achieved. China is leading the way and is in the forefront in this respect: facial recognition, smart speakers, intelligent customer service, etc. In recent years, not only has an increasing number of companies started to apply AI, but AI itself has also become one of the professional directions about which candidates in university entrance exams are worried.

According to statistics, there are 40 AI companies in the world with a turnover of over one billion dollars, 20 of them in the United States and as many as 15 in China. In quantitative terms, China is firmly ranking second. It should be noted, however, that although these companies have high ratings, their profitability is still limited and most of them may even be loss-making.

The core AI sector should be independent of the information industry, but should increasingly open up to transport, medicine, urban fabric and industries led independently by AI technology. These sectors are already being developed in China.

China accounts for over a third of the world’s AI start-ups. And although the quantity is high, the quality still needs to be improved. First of all, the application scenarios are limited. Besides facial recognition, security, etc., other fields are not easy to use and are exposed to risks such as 1) data insecurity and 2) algorithm insecurity. These two aspects are currently the main factors limiting the development of the AI industry, which is in danger of being prey to hackers of known origin.

With regard to data insecurity, we know that the effect of AI applications depends to a large extent on data quality, which entails security problems such as the loss of privacy (i.e. State security). If the problem of privacy protection is not solved, the AI industry cannot develop in a healthy way, as it would be working for ‘unknown’ third parties.

When we log into a webpage and we are told that the most important thing for them is the surfers’ privacy, this is a lie as even teenage hackers know programs to violate it: at least China tells us about the laughableness of such politically correct statements.

The second important issue is the algorithm insecurity. The so-called insecure algorithm is a model that is used under specific conditions and will not work if the conditions are different. This is also called unrobustness, i.e. the algorithm vulnerability to the test environment.

Taking autonomous driving as an example, it is impossible to consider all scenarios during AI training and to deal with new emergencies when unexpected events occur. At the same time, this vulnerability also makes AI systems permeable to attacks, deception and frauds.

The problem of security in AI does not lie in politicians’ empty speeches and words, but needs to be solved from a technical viewpoint. This distinction is at the basis of AI3.

It has a development path that combines the first generation knowledge-based AI and the second generation data-driven AI. It uses the four elements – knowledge, data, algorithms and computing power – to establish a new theory and interpretable and robust methods for a safe, credible and reliable technology.

At the moment, the AI2 characterised by deep learning is still in a phase of growth and hence the question arises whether the industry can accept the concept of AI3 development.

As seen above, AI has been developing for over 70 years and now it seems to be a “prologue’.

Currently most people are not able to accept the concept of AI3 because everybody was hoping for further advances and steps forward in AI2. Everybody felt that AI could continue to develop by relying on learning and not on processing. The first steps of AI3 in China took place in early 2015 and in 2018.

The AI3 has to solve security problems from a technical viewpoint. Specifically, the approach consists in combining knowledge and data. Some related research has been carried out in China over the past four or five years and the results have also been applied at industrial level. The RealSecure data security platform and the RealSafe algorithm security platform are direct evidence of these successes.

What needs to be emphasised is that these activities can only solve particular security problems in specific circumstances. In other words, the problem of AI security has not yet found a fundamental solution, and it is likely to become a long-lasting topic without a definitive solution since – just to use a metaphor – once the lock is found, there is always an expert burglar. In the future, the field of AI security will be in a state of ongoing confrontation between external offence and internal defence – hence algorithms must be updated constantly and continuously.

The progression of AI3 will be a natural long-term process. Fortunately, however, there is an important AI characteristic – i.e. that every result put on the table always has great application value. This is also one of the important reasons why all countries attach great importance to AI development, as their national interest and real independence are at stake.

With changes taking place around the world and a global economy in deep recession due to Covid-19, the upcoming 14th Five-Year Plan (2021-25) of the People’s Republic of China will be the roadmap for achieving the country’s development goals in the midst of global turmoil.

As AI is included in the aforementioned plan, its development shall also tackle many “security bottlenecks”. Firstly, there is a wide gap in the innovation and application of AI in the field of network security, and many scenarios are still at the stage of academic exploration and research.

Secondly, AI itself lacks a systematic security assessment and there are severe risks in all software and hardware aspects. Furthermore, the research and innovation environment on AI security is not yet at its peak and the relevant Chinese domestic industry not yet at the top position, seeking more experience.

Since 2017, in response to the AI3 Development Plan issued by the State Council, 15 Ministries and Commissions including the Ministry of Science and Technology, the Development and Reform Commission, etc. have jointly established an innovation platform. This platform is made up of leading companies in the industry, focusing on open innovation in the AI segment.

At present, thanks to this platform, many achievements have been made in the field of security. As first team in the world to conduct research on AI infrastructure from a system implementation perspective, over 100 vulnerabilities have been found in the main machine learning frameworks and dependent components in China.

The number of vulnerabilities make Chinese researchers rank first in the world. At the same time, a future innovation plan -developed and released to open tens of billions of security big data – is being studied to promote the solution to those problems that need continuous updates.

The government’s working report promotes academic cooperation and pushes industry and universities to conduct innovative research into three aspects: a) AI algorithm security comparison; 2) AI infrastructure security detection; 3) AI applications in key cyberspace security scenarios.

By means of state-of-the-art theoretical and basic research, we also need to provide technical reserves for the construction of basic AI hardware and open source software platforms (i.e. programmes that are not protected by copyright and can be freely modified by users) and AI security detection platforms, so as to reduce the risks inherent in AI security technology and ensure the healthy development of AI itself.

With specific reference to security, on March 23 it was announced that the Chinese and Russian Foreign Ministers had signed a joint statement on various current global governance issues.

The statement stresses that the continued spread of the Covid-19 pandemic has accelerated the evolution of the international scene, has caused a further imbalance in the global governance system and has affected the process of economic development while new global threats and challenges have emerged one after another and the world has entered a period of turbulent changes. The statement appeals to the international community to put aside differences, build consensus, strengthen coordination, preserve world peace and geostrategic stability, as well as promote the building of a more equitable, democratic and rational multipolar international order.

In view of ensuring all this, the independence enshrined by international law is obviously not enough, nor is the possession of nuclear deterrent. What is needed, instead, is the country’s absolute control of information security, which in turn orients and directs the weapon systems, the remote control of which is the greedy prey to the usual suspects.

Continue Reading

Publications

Latest

Human Rights42 mins ago

Free press ‘a cornerstone’ of democratic societies

The United Nations Secretary-General on Monday urged governments to “do everything in their power” to support free, independent and diverse...

South Asia2 hours ago

The World Biggest COVID-19 Crisis: Failure of India’s Vaccine Diplomacy

As over 100 million people in the U.S. are fully vaccinated and the world’s daily count of new cases is...

Finance4 hours ago

New ways of thinking and working are necessary to reap blockchain benefits in capital markets

The World Economic Forum today released Digital Assets, Distributed Ledger Technology, and the Future of Capital Markets. Across the capital...

Development6 hours ago

Ukraine to Modernize Higher Education System with World Bank Support

The World Bank’s Board of Executive Directors approved today a $200 million project to support the Government of Ukraine’s efforts...

Tourism8 hours ago

New Report Shows Value of IP to the Tourism Sector

A new report published jointly by WIPO and the World Tourism Organization (UNWTO) on the value of intellectual property in...

Human Rights10 hours ago

155 million faced acute food insecurity in 2020, conflict the key driver

At least 155 million people faced crisis levels of food insecurity in 2020 because of conflict, extreme weather events and...

Reports12 hours ago

COVID-19 has reshaped last-mile logistics, with e-commerce deliveries rising 25% in 2020

COVID-19 has shifted the way people buy goods, accelerating the rise in online shopping and e-commerce deliveries. According to a...

Trending