Книга: Атлас искусственного интеллекта: руководство для будущего
Назад: Примечания
Дальше: Примечания

286

Dastin, «Amazon Scraps Secret AI Recruiting Tool.»

287

Dastin.

288

This is part of a larger trend toward automating aspects of hiring. For a detailed account, see Ajunwa and Greene, «Platforms at Work.»

289

There are several superb accounts of the history of inequality and dicrimination in computation. These are a few that have informed my thinking on these issues: Hicks, Programmed Inequality; McIlwain, Black Software; Light, «When Computers Were Women»; and Ensmenger, Computer Boys Take Over.

290

Cetina, Epistemic Cultures, 3.

291

Merler et al., «Diversity in Faces.»

292

Buolamwini and Gebru, «Gender Shades»; Raj et al. «Saving Face.»

293

Merler et al., «Diversity in Faces.»

294

«YFCC100M Core Dataset.»

295

Merler et al., «Diversity in Faces,» 1.

296

There are many excellent books on these issues, but in particular, see Roberts, Fatal Invention, 18–41; and Nelson, Social Life of DNA, See also Tishkoff and Kidd, «Implications of Biogeography.»

297

Browne, «Digital Epidermalization,» 135.

298

Benthall and Haynes, «Racial Categories in Machine Learning.»

299

Mitchell, «Need for Biases in Learning Generalizations.»

300

Dietterich and Kong, «Machine Learning Bias, Statistical Bias.»

301

Domingos, «Useful Things to Know about Machine Learning.»

302

Maddox v. State, 32 Ga. 5S7, 79 Am. Dec. 307; Pierson v. State, 18 Tex. App. 55S; Hinkle v. State, 94 Ga. 595, 21 S. E. 601.

303

Tversky and Kahneman, «Judgment under Uncertainty.»

304

Greenwald and Krieger, «Implicit Bias,» 951.

305

Fellbaum, WordNet, xviii. Below I am drawing on research into ImageNet conducted with Trevor Paglen. See Crawford and Paglen, «Excavating AI.»

306

Fellbaum, xix.

307

Nelson and Kucera, Brown Corpus Manual.

308

Borges, «The Analytical Language of John Wilkins.»

309

These are some of the categories that have now been deleted entirely from ImageNet as of October 1, 2020.

310

See Keyes, «Misgendering Machines.»

311

Drescher, «Out of DSM.»

312

See Bayer, Homosexuality and American Psychiatry.

313

Keyes, «Misgendering Machines.»

314

Hacking, «Making Up People,» 23.

315

Bowker and Star, Sorting Things Out, 196.

316

This is drawn from Lakoff, Women, Fire, and Dangerous Things.

317

ImageNet Roulette was one of the outputs of a multiyear research collaboration between the artist Trevor Paglen and me, in which we studied the underlying logic of multiple benchmark training sets in AI. ImageNet Roulette, led by Paglen and produced by Leif Ryge, was an app that allowed people to interact with a neural net trained on the «person» category of ImageNet. People could upload images of themselves – or news images or historical photographs – to see how ImageNet would label them. People could also see how many of the labels are bizarre, racist, misogynist, and otherwise problematic. The app was designed to show people these concerning labels while warning them in advance of the potential results. All uploaded image data were immediately deleted on processing. See Crawford and Paglen, «Excavating AI.»

318

Yang et al., «Towards Fairer Datasets,» paragraph 4.2.

319

Yang et al., paragraph 4.3.

320

Markoff, «Seeking a Better Way to Find Web Images.»

321

Browne, Dark Matters, 114.

322

Scheuerman et al., «How We’ve Taught Algorithms to See Identity.»

323

UTKFace Large Scale Face Dataset, https://susanqq.github.io/UTK Face.

324

Bowker and Star, Sorting Things Out, 197.

325

Bowker and Star, 198.

326

Edwards and Hecht, «History and the Technopolitics of Identity,» 627.

327

Haraway, Modest_Witness@Second_Millennium, 234.

328

Stark, «Facial Recognition Is the Plutonium of AI,» 53.

329

In order of the examples, see Wang and Kosinski, «Deep Neural Networks Are More Accurate than Humans»; Wu and Zhang, «Automated Inference on Criminality Using Face Images»; and Angwin et al., «Machine Bias.»

330

Agüera y Arcas, Mitchell, and Todorov, «Physiognomy’s New Clothes.»

331

Nielsen, Disability History of the United States; Kafer, Feminist, Queer, Crip; Siebers, Disability Theory.

332

Whittaker et al., «Disability, Bias, and AI.»

333

Hacking, «Kinds of People,» 289.

334

Bowker and Star, Sorting Things Out, 31.

335

Bowker and Star, 6.

336

Eco, Infinity of Lists.

337

Douglass, «West India Emancipation.»

338

Particular thanks to Alex Campolo, who was my research assistant and interlocutor for this chapter, and for his research into Ekman and the history of emotions.

339

«Emotion Detection and Recognition»; Schwartz, «Don’t Look Now.»

340

Ohtake, «Psychologist Paul Ekman Delights at Exploratorium.»

341

Ekman, Emotions Revealed, 7.

342

For an overview of researchers who have found flaws in the claim that emotional expressions are universal and can be predicted by AI, see Heaven, «Why Faces Don’t Always Tell the Truth.»

343

Barrett et al., «Emotional Expressions Reconsidered.»

344

Nilsson, «How AI Helps Recruiters.»

345

Sánchez-Monedero and Dencik, «Datafication of the Workplace,» 48; Harwell, «Face-Scanning Algorithm.»

346

Byford, «Apple Buys Emotient.»

347

Molnar, Robbins, and Pierson, «Cutting Edge.»

348

Picard, «Affective Computing Group.»

349

«Affectiva Human Perception AI Analyzes Complex Human States.»

350

Schwartz, «Don’t Look Now.»

351

See, e. g., Nilsson, «How AI Helps Recruiters.»

352

«Face: An AI Service That Analyzes Faces in Images.»

353

«Amazon Rekognition Improves Face Analysis»; «Amazon Rekognition – Video and Image.»

354

Barrett et al., «Emotional Expressions Reconsidered,» 1.

355

Sedgwick, Frank, and Alexander, Shame and Its Sisters, 258.

356

Tomkins, Affect Imagery Consciousness.

357

Tomkins.

358

Leys, Ascent of Affect, 18.

359

Tomkins, Affect Imagery Consciousness, 23.

360

Tomkins, 23.

361

Tomkins, 23.

362

For Ruth Leys, this «radical dissociation between feeling and cognition» is the major reason for its attractiveness to theorists in the humanities, most notably Eve Kosofsky Sedgwick, who wants to revalorize our experiences of error or confusion into new forms of freedom. Leys, Ascent of Affect, 35; Sedgwick, Touching Feeling.

363

Tomkins, Affect Imagery Consciousness, 204.

364

Tomkins, 206; Darwin, Expression of the Emotions; Duchenne (de Boulogne), Mécanisme de la physionomie humaine.

365

Tomkins, 243, quoted in Leys, Ascent of Affect, 32.

366

Tomkins, Affect Imagery Consciousness, 216.

367

Ekman, Nonverbal Messages, 45.

368

Tuschling, «Age of Affective Computing,» 186.

369

Ekman, Nonverbal Messages, 45.

370

Ekman, 46.

371

Ekman, 46.

372

Ekman, 46.

373

Ekman, 46.

374

Ekman, 46.

375

Ekman and Rosenberg, What the Face Reveals, 375.

376

Tomkins and McCarter, «What and Where Are the Primary Affects?»

377

Russell, «Is There Universal Recognition of Emotion from Facial Expression?» 116.

378

Leys, Ascent of Affect, 93.

379

Ekman and Rosenberg, What the Face Reveals, 377.

380

Ekman, Sorenson, and Friesen, «Pan-Cultural Elements in Facial Diplays of Emotion,» 86, 87.

381

Ekman and Friesen, «Constants across Cultures in the Face and Emotion,» 128.

382

Aristotle, Categories, 70b8–13, 527.

383

Aristotle, 805a, 27–30, 87.

384

It would be difficult to overstate the influence of this work, which has since fallen into disrepute: by 1810 it went through sixteen German and twenty English editions. Graham, «Lavater’s Physiognomy in England,» 561.

385

Gray, About Face, 342.

386

Courtine and Haroche, Histoire du visage, 132.

387

Ekman, «Duchenne and Facial Expression of Emotion.»

388

Duchenne (de Boulogne), Mécanisme de la physionomie humaine.

389

Clarac, Massion, and Smith, «Duchenne, Charcot and Babinski,» 362-63.

390

Delaporte, Anatomy of the Passions, 33.

391

Delaporte, 48–51.

392

Daston and Galison, Objectivity.

393

Darwin, Expression of the Emotions in Man and Animals, 12, 307.

394

Leys, Ascent of Affect, 85; Russell, «Universal Recognition of Emotion,» 114.

395

Ekman and Friesen, «Nonverbal Leakage and Clues to Deception,» 93.

396

Pontin, «Lie Detection.»

397

Ekman and Friesen, «Nonverbal Leakage and Clues to Deception,» In a footnote, Ekman and Friesen explained: «Our own research and the evidence from the neurophysiology of visual perception strongly suggest that micro-expressions that are as short as one motion-picture frame (1/50 of a second) can be perceived. That these micro-expressions are not usually seen must depend upon their being embedded in other expressions which distract attention, their infrequency, or some learned perceptual habit of ignoring fast facial expressions.»

398

Ekman, Sorenson, and Friesen, «Pan-Cultural Elements in Facial Displays of Emotion,» 87.

399

Ekman, Friesen, and Tomkins, «Facial Affect Scoring Technique,» 40.

400

Ekman, Nonverbal Messages, 97.

401

Ekman, 102.

402

Ekman and Rosenberg, What the Face Reveals.

403

Ekman, Nonverbal Messages, 105.

404

Ekman, 169.

405

Eckman, 106; Aleksander, Artificial Vision for Robots.

406

«Magic from Invention.»

407

Bledsoe, «Model Method in Facial Recognition.»

408

Molnar, Robbins, and Pierson, «Cutting Edge.»

409

Kanade, Computer Recognition of Human Faces.

410

Kanade, 16.

411

Kanade, Cohn, and Tian, «Comprehensive Database for Facial Expression Analysis,» 6.

412

See Kanade, Cohn, and Tian; Lyons et al., «Coding Facial Expressions with Gabor Wavelets»; and Goeleven et al., «Karolinska Directed Emotional Faces.»

413

Lucey et al., «Extended Cohn-Kanade Dataset (CK+).»

414

McDuff et al., «Affectiva-MIT Facial Expression Dataset (AM-FED).»

415

McDuff et al.

416

Ekman and Friesen, Facial Action Coding System (FACS).

417

Foreman, «Conversation with: Paul Ekman»; Taylor, «2009 Time 100»; Paul Ekman Group.

418

Weinberger, «Airport Security,» 413.

419

Halsey, «House Member Questions $900 Million TSA ‘SPOT’ Screening Program.»

420

Ekman, «Life’s Pursuit»; Ekman, Nonverbal Messages, 79–81.

421

Mead, «Review of Darwin and Facial Expression,» 209.

422

Tomkins, Affect Imagery Consciousness, 216.

423

Mead, «Review of Darwin and Facial Expression,» See also Fridlund, «Behavioral Ecology View of Facial Displays.» Ekman later conceded to many of Mead’s points. See Ekman, «Argument for Basic Emotions»; Ekman, Emotions Revealed; and Ekman, «What Scientists Who Study Emotion Agree About.» Ekman also had his defenders. See Cowen et al., «Mapping the Passions»; and Elfenbein and Ambady, «Universality and Cultural Specificity of Emotion Recognition.»

424

Fernández-Dols and Russell, Science of Facial Expression, 4.

425

Gendron and Barrett, Facing the Past, 30.

426

Vincent, «AI ‘Emotion Recognition’ Can’t Be Trusted.’» Disability studies scholars have also noted that assumptions about how biology and bodies function can also raise concerns around bias, especially when automated through technology. See Whittaker et al., «Disability, Bias, and AI.»

427

Izard, «Many Meanings/Aspects of Emotion.»

428

Leys, Ascent of Affect, 22.

429

Leys, 92.

430

Leys, 94.

431

Leys, 94.

432

Barrett, «Are Emotions Natural Kinds?» 28.

433

Barrett, 30.

434

See, e. g., Barrett et al., «Emotional Expressions Reconsidered.»

435

Barrett et al., 40.

436

Kappas, «Smile When You Read This,» 39, emphasis added.

437

Kappas, 40.

438

Barrett et al., 46.

439

Barrett et al., 47–48.

440

Barrett et al., 47, emphasis added.

441

Apelbaum, «One Thousand and One Nights.»

442

See, e. g., Hoft, «Facial, Speech and Virtual Polygraph Analysis.»

443

Rhue, «Racial Influence on Automated Perceptions of Emotions.»

444

Barrett et al., «Emotional Expressions Reconsidered,»48.

445

See, e. g., Connor, «Chinese School Uses Facial Recognition»; and Du and Maki, «AI Cameras That Can Spot Shoplifters.»

446

NOFORN stands for Not Releasable to Foreign Nationals. «Use of the ‘Not Releasable to Foreign Nationals’ (NOFORN) Caveat.»

447

The Five Eyes is a global intelligence alliance comprising Australia, Canada, New Zealand, the United Kingdom, and the United States. «Five Eyes Intelligence Oversight and Review Council.»

448

Galison, «Removing Knowledge,» 229.

449

Risen and Poitras, «N.S.A. Report Outlined Goals for More Power»; Müller-Maguhn et al., «The NSA Breach of Telekom and Other German Firms.»

450

FOxACID is software developed by the Office of Tailored Access Operations, now Computer Network Operations, a cyberwarfare intelligence gathering unit of the NSA.

451

Schneier, «Attacking Tor.» Document available at «NSA Phishing Tactics and Man in the Middle Attacks.»

452

Swinhoe, «What Is Spear Phishing?»

453

«Strategy for Surveillance Powers.»

454

Edwards, Closed World.

455

Edwards.

456

Edwards, 198.

457

Mbembé, Necropolitics, 82.

458

Bratton, Stack, 151.

459

For an excellent account of the history of the internet in the United States, see Abbate, Inventing the Internet.

460

SHARE Foundation, «Serbian Government Is Implementing Unlawful Video Surveillance.»

461

Department of International Cooperation Ministry of Science and Technology, «Next Generation Artificial Intelligence Development Plan.»

462

Chun, Control and Freedom; Hu, Prehistory of the Cloud, 87–88.

463

Cave and ÓhÉigeartaigh, «AI Race for Strategic Advantage.»

464

Markoff, «Pentagon Turns to Silicon Valley for Edge.»

465

Brown, Department of Defense Annual Report.

466

Martinage, «Toward a New Offset Strategy,» 5–16.

467

Carter, «Remarks on ‘the Path to an Innovative Future for Defense’»; Pellerin, «Deputy Secretary.»

468

The origins of U.S. military offsets can be traced back to December 1952, when the Soviet Union had almost ten times more conventional military divisions than the United States. President Dwight Eisenhower turned to nuclear deterrence as a way to «offset» these odds. The strategy involved not only the threat of the retaliatory power of the U.S. nuclear forces but also accelerating the growth of the U.S. weapons stockpile, as well as developing long-range jet bombers, the hydrogen bomb, and eventually intercontinental ballistic missiles. It also included increased reliance on espionage, sabotage, and covert operations. In the 1970s and 1980s, U.S. military strategy turned to computational advances in analytics and logistics, building on the influence of such military architects as Robert McNamara in search of military supremacy. This Second Offset could be seen in military engagements like Operation Desert Storm during the Gulf War in 1991, where reconnaissance, suppression of enemy defenses, and precision-guided munitions dominated how the United States not only fought the war but thought and spoke about it. Yet as Russia and China began to adopt these capacities and deploy digital networks for warfare, anxiety grew to reestablish a new kind of strategic advantage. See McNamara and Blight, Wilson’s Ghost.

469

Pellerin, «Deputy Secretary.»

470

Gellman and Poitras, «U.S., British Intelligence Mining Data.»

471

Deputy Secretary of Defense to Secretaries of the Military Departments et al.

472

Deputy Secretary of Defense to Secretaries of the Military Departments et al.

473

Michel, Eyes in the Sky, 134.

474

Michel, 135.

475

Cameron and Conger, «Google Is Helping the Pentagon Build AI for Drones.»

476

For example, Gebru et al., «Fine-Grained Car Detection for Visual Census Estimation.»

477

Fang, «Leaked Emails Show Google Expected Lucrative Military Drone AI Work.»

478

Bergen, «Pentagon Drone Program Is Using Google AI.»

479

Shane and Wakabayashi, «‘Business of War.’»

480

Smith, «Technology and the US Military.»

481

When the JEDI contract was ultimately awarded to Microsoft, Brad Smith, the president of Microsoft, explained that the reason that Microsoft won the contract was that it was seen «not just as a sales opportunity, but really, a very large-scale engineering project.» Stewart and Carlson, «President of Microsoft Says It Took Its Bid.»

482

Pichai, «AI at Google.»

483

Pichai. Project Maven was subsequently picked up by Anduril Industries, a secretive tech startup founded by Oculus Rift’s Palmer Luckey. Fang, «Defense Tech Startup.»

484

Whittaker et al., AI Now Report 2018.

485

Schmidt quoted in Scharre et al., «Eric Schmidt Keynote Address.»

486

As Suchman notes, «‘Killing people correctly’ under the laws of war requires adherence to the Principle of Distinction and the identification of an imminent threat.» Suchman, «Algorithmic Warfare and the Reinvention of Accuracy,» n. 18.

487

Suchman.

488

Suchman.

489

Hagendorff, «Ethics of AI Ethics.»

490

Brustein and Bergen, «Google Wants to Do Business with the Military.»

491

For more on why municipalities should more carefully assess the risks of algorithmic platforms, see Green, Smart Enough City.

492

Thiel, «Good for Google, Bad for America.»

493

Steinberger, «Does Palantir See Too Much?»

494

Weigel, «Palantir goes to the Frankfurt School.»

495

Dilanian, «US Special Operations Forces Are Clamoring to Use Software.»

496

«War against Immigrants.»

497

Alden, «Inside Palantir, Silicon Valley’s Most Secretive Company.»

498

Alden, «Inside Palantir, Silicon Valley’s Most Secretive Company.»

499

Waldman, Chapman, and Robertson, «Palantir Knows Everything about You.»

500

Joseph, «Data Company Directly Powers Immigration Raids in Workplace»; Anzilotti, «Emails Show That ICE Uses Palantir Technology to Detain Undocumented Immigrants.»

501

Andrew Ferguson, conversation with author, June 21, 2019.

502

Brayne, «Big Data Surveillance.» Brayne also notes that the migration of law enforcement to intelligence was occurring even before the shift to predictive analytics, given such court decisions as Terry v. Ohio and Whren v. United States that made it easier for law enforcement to circumvent probable cause and produced a proliferation of pretext stops.

503

Richardson, Schultz, and Crawford, «Dirty Data, Bad Predictions.»

504

Brayne, «Big Data Surveillance,» 997.

505

Brayne, 997.

506

See, e. g., French and Browne, «Surveillance as Social Regulation.»

507

Crawford and Schultz, «AI Systems as State Actors.»

508

Cohen, Between Truth and Power; Calo and Citron, «Automated Administrative State.»

509

«Vigilant Solutions»; Maass and Lipton, «What We Learned.»

510

Newman, «Internal Docs Show How ICE Gets Surveillance Help.»

511

England, «UK Police’s Facial Recognition System.»

512

Scott, Seeing Like a State.

513

Haskins, «How Ring Transmits Fear to American Suburbs.»

514

Haskins, «Amazon’s Home Security Company.»

515

Haskins.

516

Haskins. «Amazon Requires Police to Shill Surveillance Cameras.»

517

Haskins, «Amazon Is Coaching Cops.»

518

Haskins.

519

Haskins.

520

Hu, Prehistory of the Cloud, 115.

521

Hu, 115.

522

Benson, «‘Kill ’Em and Sort It Out Later,’» 17.

523

Hajjar, «Lawfare and Armed Conflicts,» 70.

524

Scahill and Greenwald, «NSA’s Secret Role in the U.S. Assassination Program.»

525

Cole, «‘We Kill People Based on Metadata.’»

526

Priest, «NSA Growth Fueled by Need to Target Terrorists.»

527

Gibson quoted in Ackerman, «41 Men Targeted but 1,147 People Killed.»

528

Tucker, «Refugee or Terrorist?»

529

Tucker.

530

O’Neil, Weapons of Math Destruction, 288–326.

531

Fourcade and Healy, «Seeing Like a Market.»

532

Eubanks, Automating Inequality.

533

Richardson, Schultz, and Southerland, «Litigating Algorithms,» 19.

534

Richardson, Schultz, and Southerland, 23.

535

Agre, Computation and Human Experience, 240.

536

Bratton, Stack, 140.

537

Hu, Prehistory of the Cloud, 89.

538

Nakashima and Warrick, «For NSA Chief, Terrorist Threat Drives Passion.»

539

Document available at Maass, «Summit Fever.»

540

The future of the Snowden archive itself is uncertain. In March 2019, it was announced that the Intercept – the publication that Glenn Greenwald established with Laura Poitras and Jeremy Scahill after they shared the Pulitzer Prize for their reporting on the Snowden materials – was no longer going to fund the Snowden archive. Tani, «Intercept Shuts Down Access to Snowden Trove.»

541

Silver et al., «Mastering the Game of Go without Human Knowledge.»

542

Silver et al., 357.

543

Full talk at the Artificial Intelligence Channel: Demis Hassabis, DeepMind – Learning from First Principles. See also Knight, «Alpha Zero’s ‘Alien’ Chess Shows the Power.»

544

Demis Hassabis, DeepMind – Learning from First Principles.

545

For more on the myths of «magic» in AI, see Elish and boyd, «Situating Methods in the Magic of Big Data and AI.»

546

Meredith Broussard notes that playing games has been dangerously conflated with intelligence. She cites the programmer George V. NevilleNeil, who argues: «We have had nearly 50 years of human/computer competition in the game of chess, but does this mean that any of those computers are intelligent? No, it does not – for two reasons. The first is that chess is not a test of intelligence; it is the test of a particular skill – the skill of playing chess. If I could beat a Grandmaster at chess and yet not be able to hand you the salt at the table when asked, would I be intelligent? The second reason is that thinking chess was a test of intelligence was based on a false cultural premise that brilliant chess players were brilliant minds, more gifted than those around them. Yes, many intelligent people excel at chess, but chess, or any other single skill, does not denote intelligence.» Broussard, Artificial Unintelligence, 206.

547

Galison, «Ontology of the Enemy.»

548

Campolo and Crawford, «Enchanted Determinism.»

549

Bailey, «Dimensions of Rhetoric in Conditions of Uncertainty,» 30.

550

Bostrom, Superintelligence.

551

Bostrom.

552

Strand, «Keyword: Evil,» 64–65.

553

Strand, 65.

554

Hardt and Negri, Assembly, 116, emphasis added.

555

Wakabayashi, «Google’s Shadow Work Force.»

556

Quoted in McNeil, «Two Eyes See More Than Nine,» 23.

557

On the idea of data as capital, see Sadowski, «When Data Is Capital.»

558

Harun Farocki discussed in Paglen, «Operational Images.»

559

For a summary, see Heaven, «Why Faces Don’t Always Tell the Truth.»

560

Nietzsche, Sämtliche Werke, 11:506.

561

Wang and Kosinski, «Deep Neural Networks Are More Accurate Than Humans»; Kleinberg et al., «Human Decisions and Machine Predictions»; Crosman, «Is AI a Threat to Fair Lending?»; Seo et al., «Partially Generative Neural Networks.»

562

Pugliese, «Death by Metadata.»

563

Suchman, «Algorithmic Warfare and the Reinvention of Accuracy.»

564

Simmons, «Rekor Software Adds License Plate Reader Technology.»

565

Lorde, Master’s Tools.

566

Schaake, «What Principles Not to Disrupt.»

567

Jobin, Ienca, and Vayena, «Global Landscape of AI Ethics Guidelines.»

568

Mattern, «Calculative Composition,» 572.

569

For more on why AI ethics frameworks are limited in effectiveness, see Crawford et al., AI Now 2019 Report.

570

Mittelstadt, «Principles Alone Cannot Guarantee Ethical AI.» See also Metcalf, Moss, and boyd, «Owning Ethics.»

Назад: Примечания
Дальше: Примечания