Artificial Intelligence and Democratic Values


Introduction to Special Issue of the Turkish Policy Quarterly (TPQ): “…Artificial intelligence has fast become part of everyday life, and we wanted to understand how it fits into democratic values. It was important for us to ask how we can ensure that AI and digital policies will promote broad social inclusion, which relies on fundamental rights, democratic institutions, and the rule of law. There seems to be no shortage of principles and concepts that support the fair and responsible use of AI systems, yet it’s difficult to determine how to efficiently manage or deploy those systems today.

Merve Hickok and Marc Rotenberg, two TPQ Advisory Board members, wrote the lead article for this issue. In a world where data means power, vast amounts of data are collected every day by both private companies and government agencies, which then use this data to fuel complex systems for automated decision-making now broadly described as “Artificial Intelligence.” Activities managed with these AI systems range from policing to military, to access to public services and resources such as benefits, education, and employment. The expected benefits from having national talent, capacity, and capabilities to develop and deploy these systems also drive a lot of national governments to prioritize AI and digital policies. A crucial question for policymakers is how to reap the benefits while reducing the negative impacts of these sociotechnical systems on society.

Gabriela Ramos, Assistant Director-General for Social and Human Sciences of UNESCO, has written an article entitled “Ethics of AI and Democracy: UNESCO’s Recommendation’s Insights”. In her article, she discusses how artificial intelligence (AI) can affect democracy. The article discusses the ways in which Artificial Intelligence is affecting democratic processes, democratic values, and the political and social behavior of citizens. The article notes that the use of artificial intelligence, and its potential abuse by some government entities, as well as by big private corporations, poses a serious threat to rights-based democratic institutions, processes, and norms. UNESCO announced a remarkable consensus agreement among 193 member states creating the first-ever global standard on the ethics of AI that could serve as a blueprint for national AI legislation and a global AI ethics benchmark.

Paul Nemitz, Principal Adviser on Justice Policy at the EU Commission, addresses the question of what drives democracy. In his view, technology has undoubtedly shaped democracy. However, technology as well as legal rules regarding technology have shaped and have been shaped by democracy. This is why he says it is essential to develop and use technology according to democratic principles. He writes that there are libertarians today who purposefully design technological systems in such a way that challenges democratic control. It is, however, clear that there is enough counterpower and engagement, at least in Europe, to keep democracy functioning, as long as we work together to create rules that are sensible for democracy’s future and confirm democracy’s supremacy over technology and business interests.

Research associate at the University of Oxford and Professor at European University Cyprus, Paul Timmers, writes about how AI challenges sovereignty and democracy. AI is wonderful. AI is scary. AI is the path to paradise. AI is the path to hell.  What do we make of these contradictory images when, in a world of AI, we seek to both protect sovereignty and respect democratic values? Neither a techno-utopian nor a dystopian view of AI is helpful. The direction of travel must be global guidance and national or regional AI law that stresses end-to-end accountability and AI transparency, while recognizing practical and fundamental limits.

Tania Sourdin, Dean of Newcastle Law School, Australia, asks: what if judges were replaced by AI? She believes that although AI will increasingly be used to support judges when making decisions in most jurisdictions, there will also be attempts over the next decade to totally replace judges with AI. Increasingly, we are seeing a shift towards Judge AI, and to a certain extent we are seeing shifts towards supporting Judge AI, which raises concerns related to democratic values, structures, and what judicial independence means. The reason for this may be partly due to the systems used being set up to support a legal interpretation that fails to allow for a nuanced and contextual view of the law.

Pam Dixon, Executive Director of the World Privacy Forum, writes about biometric technologies. She says that biometric technologies encompass many types, or modalities, of biometrics today, such as face recognition, iris recognition, fingerprint recognition, and DNA recognition, both separately and in combination. A growing body of law and regulations seeks to mitigate the risks associated with biometric technologies as they are increasingly understood as a technology of concern based on scientific data.

We invite you to learn more about how our world is changing. As a way to honor this milestone, we have assembled a list of articles from around the world from some of the best experts in their field. This issue would not be possible without the assistance of many people. In addition to the contributing authors, there were many other individuals who contributed greatly. TPQ’s team is proud to present you with this edition….(More)” (Full list)”

Web3 and the Trap of ‘For Good’


Article by By Scott Smith & Lina Srivastava : “There are three linked challenges baked into Web3 that any proponent of positive social impact must solve.

1. Decentralized tech doesn’t equal distributed power. Web3 has become synonymous with the decentralized web, and one of the selling points of Web3 technologies is decentralization or shared ownership of web infrastructure. But in reality, ownership is too often centralized by and for those with resources already, the wealthy (even if only coin-wealthy) and corporations.

As the example of NFT marketplace OpenSea demonstrates, risks are too easily distributed onto the users, even as the gains remain very much centralized for platform owners and a small minority of participants. Even Ethereum co-creator Vitalik Buterin has issued warnings about power concentration in Web3 token-based economies, saying crypto “whales” can have too much power in these economies. Systems become inherently extractive unless ownership is shared and distributed by a majority, particularly by those who are traditionally most vulnerable to exploitation.

For this reason, equitable power structures must be proactively designed in Web3 systems.

2. A significant percentage of existing power holders are already building their Web3 business models on exploitation and extraction. At present, these business models mine energy and other resources to the detriment of our climate and environment and of energy-poor communities, in some cases actively resuscitating wasteful or harmful power projects. They do so without addressing these concerns in their core business model (or even by creating offsets, a less desirable alternative but still better than nothing).

These models are meant to avoid accountability to platform users or vulnerable communities in either economic or environmental terms. But they nevertheless ask for our trust?

3. Building community trust takes more than decentralization. Those who are building over distributed technologies often claim it as a solution to a trust deficit, that “trust” is inherent to the systems. Except that it isn’t…(More)”

Letters and cards telling people about local police reduce crime


Article by Elicia John & Shawn D. Bushway: “Community policing is often held up as an instrumental part of reforms to make policing less harmful, particularly in low-income communities that have high rates of violence. But building collaborative relationships between communities and police is hard. Writing in Nature, Shah and LaForest describe a large field experiment revealing that giving residents cards and letters with basic information about local police officers can prevent crime. Combining these results with those from Internet-based experiments, the authors attribute the observed reduction in crime to perceived ‘information symmetry’.

Known strangers are individuals whom we’ve never met but still know something about, such as celebrities. We tend to assume, erroneously, that known strangers know as much about us as we do about them. This tendency to see information symmetry when there is none is referred to as a social heuristic — a shortcut in our mental processing…

Collaborating with the New York Police Department, the authors sent letters and cards to residents of 39 public-housing developments, providing information about the developments’ local community police officers, called neighbourhood coordination officers. These flyers included personal details, such as the officers’ favourite food, sports team or superhero. Thirty control developments had neighbourhood coordination officers, but did not receive flyers….

This field experiment provided convincing evidence that a simple intervention can reduce crime. Indeed, in the three months after the intervention, the researchers observed a 5–7% drop in crime in the developments that received the information compared with neighbourhoods that did not. This level of reduction is similar to that of more-aggressive policing policies4. The drop in crime lessened after three months, which the authors suggest is due to the light touch and limited duration of the intervention. Interventions designed to keep officers’ information at the top of residents’ minds (such as flyers sent over a longer period at a greater frequency) might therefore result in longer-term effects.

The authors attribute the reduction in crime to a heightened perception among residents receiving flyers that the officer would find out if they committed a crime. The possibilities of such findings are potentially exciting, because the work implies that a police officer who is perceived as a real person can prevent crime without tactics such as the New York City police department’s ‘stop, question and frisk’ policy, which tended to create animosity between community members and the police….(More)”

The Staggering Ecological Impacts of Computation and the Cloud


Essay by Steven Gonzalez Monserrate: “While in technical parlance the “Cloud” might refer to the pooling of computing resources over a network, in popular culture, “Cloud” has come to signify and encompass the full gamut of infrastructures that make online activity possible, everything from Instagram to Hulu to Google Drive. Like a puffy cumulus drifting across a clear blue sky, refusing to maintain a solid shape or form, the Cloud of the digital is elusive, its inner workings largely mysterious to the wider public, an example of what MIT cybernetician Norbert Weiner once called a “black box.” But just as the clouds above us, however formless or ethereal they may appear to be, are in fact made of matter, the Cloud of the digital is also relentlessly material.

To get at the matter of the Cloud we must unravel the coils of coaxial cables, fiber optic tubes, cellular towers, air conditioners, power distribution units, transformers, water pipes, computer servers, and more. We must attend to its material flows of electricity, water, air, heat, metals, minerals, and rare earth elements that undergird our digital lives. In this way, the Cloud is not only material, but is also an ecological force. As it continues to expand, its environmental impact increases, even as the engineers, technicians, and executives behind its infrastructures strive to balance profitability with sustainability. Nowhere is this dilemma more visible than in the walls of the infrastructures where the content of the Cloud lives: the factory libraries where data is stored and computational power is pooled to keep our cloud applications afloat….

To quell this thermodynamic threat, data centers overwhelmingly rely on air conditioning, a mechanical process that refrigerates the gaseous medium of air, so that it can displace or lift perilous heat away from computers. Today, power-hungry computer room air conditioners (CRACs) or computer room air handlers (CRAHs) are staples of even the most advanced data centers. In North America, most data centers draw power from “dirty” electricity grids, especially in Virginia’s “data center alley,” the site of 70 percent of the world’s internet traffic in 2019. To cool, the Cloud burns carbon, what Jeffrey Moro calls an “elemental irony.” In most data centers today, cooling accounts for greater than 40 percent of electricity usage….(More)”.

Tracking symptoms of respiratory diseases online can give a picture of community health


Article by Mvuyo Makhasi, Cheryl Cohen and Sibongile Walaza: “Participatory surveillance has not yet been implemented in African countries. There has only ever been one pilot study, in Tanzania. In 2016, a pilot study of a mobile app called AfyaData was implemented for participatory surveillance in Tanzania. The aim was to establish a platform where members of the community could report any symptoms they encountered. Based on the clinical data provided these would be grouped into categories of diseases. In the pilot study most of the reported cases were related to the digestive system. The second most frequently reported cases were related to the respiratory system. This demonstrated the potential of obtaining close to real-time data on diseases directly from the community….

Participatory surveillance is in place in 11 European countries that form part of the InfluenzaNet network. Here it’s been shown to address some of the limitations of traditional facility-based systems. For example, it can detect the start of the flu season up to two weeks earlier than traditional facility-based surveillance. This allows public health officials to plan and respond earlier to seasonal outbreaks.

Self-reporting systems provide similar and complementary data to facility-based surveillance. They show:

  • variations over time in cases of acute respiratory tract infection
  • time to peak of incidence of acute cases
  • the peak intensity of acute cases
  • a comparison between participatory and facility-based surveillance trends.

The same analysis can now be done for COVID-19 cases, which were previously not included in participatory surveillance platforms.

The systems enable analysis of health-seeking behaviour in people who don’t see a doctor or nurse. For example, people may use home-based remedies, search for guidelines on the internet or consult traditional healers. Health-seeking surveys are often conducted in research studies for a defined period of time, but data is not routinely collected. Participatory surveillance is a longitudinal and systematic way of collecting information about health-seeking behaviour related to respiratory diseases.

Vaccine effectiveness estimates can also be determined through participatory surveillance data. This includes vaccine coverage for seasonal influenza and COVID-19 and information on how these vaccines perform in preventing illness. These data can be compared with vaccine effectiveness estimates from facility-based surveillance…(More)”.

Amateur open-source researchers went viral unpacking the war in Ukraine


Article by Meaghan Tobin: “Under the pseudonym Intel Crab, University of Alabama sophomore Justin Peden has become an unlikely source of information about the unfolding Ukraine-Russia war. From his dorm room, the 20-year-old sifts through satellite images, TikTok videos, and security feeds, sharing findings like troop movements and aircraft models with more than 220,000 followers on Twitter. Peden said that his posts have reached 20 million people and his follower count has increased by over 50,000 people over the past month, according to his Twitter analytics.

Today, Peden is one of the most prominent open-source intelligence (OSINT) figures on Twitter. 

According to analysts, OSINT researchers have existed on the fringes of conflicts since at least 2014, working collaboratively across the world to comb through freely available resources like Google Maps and the satellite imagery service Maxar Technologies. They publicly conduct the type of work that intelligence agencies do behind closed doors. 

As Russia continues its invasion of Ukraine, amateur OSINT researchers have gained a particular mainstream traction. Specialized social media accounts on Twitter, like Intel Crab, Calibre Obscura, and Aurora Intel, have transfixed an information-hungry public with an analysis of key movements in Russia’s invasion, using newly available technologies to provide real-time analysis of key activities, like the supposed withdrawal of Russian troops along the Ukrainian border or the 40-mile Russian convoy outside of Ukraine’s capital, Kyiv….(More)”.

‘It’s like the wild west’: Data security in frontline aid


A Q&A on how aid workers handle sensitive data by Irwin Loy: “The cyber-attack on the International Committee of the Red Cross, discovered in January, was the latest high-profile breach to connect the dots between humanitarian data risks and real-world harms. Personal information belonging to more than 515,000 people was exposed in what the ICRC said was a “highly sophisticated” hack using tools employed mainly by states or state-backed groups.

But there are countless other examples of how the reams of data collected from some of the world’s most vulnerable communities can be compromisedmisused, and mishandled.

“The biggest frontier in the humanitarian sector is the weaponisation of humanitarian data,” said Olivia Williams, a former aid worker who now specialises in information security at Apache iX, a UK-based defence consultancy.

She recently completed research – including surveys and interviews with more than 180 aid workers from 28 countries – examining how data is handled, and what agencies and frontline staff say they do to protect it.

Sensitive data is often collected on personal devices, sent over hotel WiFi, scrawled on scraps of paper then photographed and sent to headquarters via WhatsApp, or simply emailed and widely shared with partner organisations, aid workers told her.

The organisational security and privacy policies meant to guide how data is stored and protected? Impractical, irrelevant, and often ignored, Williams said.

Some frontline staff are taking information security into their own hands, devising their own systems of coding, filing, and securing data. One respondent kept paper files locked in their bedroom.

Aid workers from dozens of major UN agencies, NGOs, Red Cross organisations, and civil society groups took part in the survey.

Williams’ findings echo her own misgivings about data security in her previous deployments to crisis zones from northern Iraq to Nepal and the Philippines. Aid workers are increasingly alarmed about how data is handled, she said, while their employers are largely “oblivious” to what actually happens on the ground.

Williams spoke to The New Humanitarian about the unspoken power imbalance in data collection, why there’s so much data, and what aid workers can do to better protect it….(More)”.

Eight reasons responsible data for and about children matters


Article by Stefaan Verhulst and Andrew Young: “…The relationship between the datafication of everyday life and child welfare has generally been under-explored, both by researchers in data ethics and those who work to advance the rights of children. This neglect is a lost opportunity, and also poses a risk to children, who are in many ways at the forefront of the steady incursions of data into our lives. In what follows, over a series of two articles, we outline eight reasons why child welfare advocates should pay more attention to data, and why we need a framework for responsible data collection and use for children….(Part 1) and (Part2). (See also Responsible Data for Children).

Archivists Make Sure the Internet Doesn’t Forget Russia’s War on Ukraine


Karl Bode at VICE: “As the Russian invasion of Ukraine accelerates, professional and hobbyist archivists alike are rushing to preserve Ukraine’s online history, cataloging and storing everything from Ukrainian government and university websites, to the torrent of news and social media posts related to the accelerating conflict.

The Internet Archive has been archiving the broader conflict in Ukraine since 2014. But as Ukraine government websites face prolonged outages due to sustained cyber attack—as well as the looming risk of defacement or deletion—the organization has taken on another monumental task: backing up the entirety of the Ukrainian Internet.

Using the crowdsourced auto-archiving software running on a virtual machine they’ve dubbed Archive Team Warrior, the organization has leveraged volunteers around the world, many of whom have donated countless terabytes of storage capacity for the project. These volunteers have been steadily backing up the Ukrainian Internet since before the war began.

All told, 68 million items (web pages, documents, and other files) comprising more than 2.5 TB of data have already been hoovered up from various websites across the .ua top level Ukrainian domain. A second project dubbed Ukr-net aims to preserve tens of millions of additional items and terabytes of additional data across the Ukrainian Internet.

Elsewhere, organizations like the Center For Information Resilience have built a crowdsourced map attempting to document every single war-related post to social media made in the region, ranging from civilian photos of the movement of heavy Russian weaponry, to Ukranian government claims of alleged bombing raids on kindergardens…(More)”.

Can Ukraine’s Experiments in Local Democracy Survive the Invasion?


Joe Mathews at Zocolo: “As I write this, Russian troops reportedly are moving north through the Odesa oblast, or region, toward the river Kodyma, along which sits a town called Balta.

This is not new territory for Balta, which like much of Ukraine has been contested over centuries of wars. But in recent years, Balta has actually broken a lot of new ground, at least when it comes to the practice of citizen-centered democracy. In 2016, Balta adopted participatory budgeting, an innovative process—originated in Brazil—in which citizens rather than officials determine their local budget. Balta also gave its young people their own governing council and a decision-making process to influence local policies.

Democracy, in its essence, is everyday people governing themselves. Such self-government happens most often at the local level, which is why countries tend to get more democratic when they decentralize.

Since the 2014 Maidan revolution, Ukraine has been among the more rapidly decentralizing, and democratizing, countries on Earth….

In a politically divided Ukraine, this devolution of local power had support across the spectrum, for a couple reasons.

The first was positive and driven by economics. Putting more money and power in localities was seen as the best bet for addressing poverty and inequality, and developing Ukraine in a balanced way that would make it a better fit with the rest of Europe, which has strong local governments. Since the 2014 Maidan revolution, Ukraine has been among the more rapidly decentralizing, and democratizing, countries on Earth.

The second reason, however, was defensive: the threat of separatism. In a country the size of Texas, greater local control was seen as the best way to placate localities and regions that might think of leaving—especially Donetsk and Luhansk, two Russian-speaking Ukrainian oblasts where Russia would make incursions (and which Putin would declare “independent” as a pretext for his new invasion).

“The path of decentralization was an asymmetrical response to the aggressor,” said Andriy Parubiy, a former speaker of Ukraine’s parliament, in 2017. “The process of the formation of capable communities was a kind of sewing of the Ukrainian space.”

Many of these newly empowered Ukrainian local governments have seized the opportunity, and not just for economic development. Municipalities have embraced political reforms—adopting ethics codes, making their records and decision-making transparent, establishing citizen-directed processes like participatory budgeting, and adding new guarantees for representation and participation of women, men, and underrepresented groups in local politics.

Just this past December, two Ukrainian cities, Khmelnytskyi and Vinnytsia, finished first and third, respectively, in a global contest for innovation in government transparency. Mariupol, a city in the southeast reportedly under siege by the Russian military, has won international praise for its model of sharing governance power with local organizations….(More)”.