All Narratives (356)
Find narratives by ethical themes or by technologies.
FILTERreset filters-
- 10 min
- The Guardian
- 2025
Meta was accused of violating fair use agreements. Writers Sarah Silverman and Ta-Nehisi Coates had argued that the Facebook owner had breached copyright law by using their books without permission to train its AI system. It was later decided in court that fair use agreements were not violated because of the prosecution’s inability to prove how this would cause market dilution by flooding the market with work similar to theirs. This may, however, be a case of not making a compelling argument in court.
- The Guardian
- 2025
-
- 10 min
- The Guardian
- 2025
Meta wins AI copyright lawsuit as US judge rules against authors
Meta was accused of violating fair use agreements. Writers Sarah Silverman and Ta-Nehisi Coates had argued that the Facebook owner had breached copyright law by using their books without permission to train its AI system. It was later decided in court that fair use agreements were not violated because of the prosecution’s inability to prove how this would cause market dilution by flooding the market with work similar to theirs. This may, however, be a case of not making a compelling argument in court.
- How is media being uploaded to AI without the owner’s permission harmful to people who rely on creative work for their careers?
- How has the movement of open information access and internet technologies helped to fuel recent advances in AI?
-
- 5 min
- Nature
- 2025
Research has found that 90% of studies on AI development, as well as 86% of the resulting patents, involve human imaging. This means that data used to train AI models are well suited to being used in surveillance applications by military, law enforcement, corporations, and other private actors. There is also substantial evidence to suggest that much of the research that created the current models were funded by government and military agencies.
- Nature
- 2025
-
- 5 min
- Nature
- 2025
Is AI watching us?
Research has found that 90% of studies on AI development, as well as 86% of the resulting patents, involve human imaging. This means that data used to train AI models are well suited to being used in surveillance applications by military, law enforcement, corporations, and other private actors. There is also substantial evidence to suggest that much of the research that created the current models were funded by government and military agencies.
- Why do you think such a significant proportion of the studies involve human imaging?
- What are the ethical barriers in using human imaging to advance AI research?
- What are potential cases in which the images and information collected may be misused by government or private companies?
-
- 5 min
- CNBC
- 2025
Following in the footsteps of the state of Indiana (2019), almost all states in the US provide tax exemptions to eligible data centers. The demand for data centers was high when the Indiana legislation was passed, but it has skyrocketed ever since the advent of LLMs and their need for more storage and energy. To attract data centers, states are forfeiting millions of dollars in taxes. Questions about whether having these exemptions is even profitable, considering that they don’t create that many jobs but use a significant amount of electricity, along with questions about who is getting these benefits, are being raised. It was found that a company applied for an exemption, but it was another holding company for Google.
- CNBC
- 2025
-
- 5 min
- CNBC
- 2025
Race to give tax cuts to data centers
Following in the footsteps of the state of Indiana (2019), almost all states in the US provide tax exemptions to eligible data centers. The demand for data centers was high when the Indiana legislation was passed, but it has skyrocketed ever since the advent of LLMs and their need for more storage and energy. To attract data centers, states are forfeiting millions of dollars in taxes. Questions about whether having these exemptions is even profitable, considering that they don’t create that many jobs but use a significant amount of electricity, along with questions about who is getting these benefits, are being raised. It was found that a company applied for an exemption, but it was another holding company for Google.
- What are the benefits of having a data center in the state compared to outside?
- What is the government’s responsibility in the propagation of data centers?
- What step can be taken to reduce the losses these tax exemptions produce?
- Should the government be establishing publicly supported data centers for equitable access to these resources?
-
- 5 min
- Nature
- 2025
Researchers in this article make an argument against the use of AI in the scientific process. They believe that the sheer volume of academic articles being produced is putting an immense strain on the peer review process. This limits the capacity for in-depth thought and confuses scientific progress with a skewed notion of academic productivity—scientific progress is quantified by the number of articles produced.
- Nature
- 2025
-
- 5 min
- Nature
- 2025
Why AI Should Not be Used in the Scientific Process
Researchers in this article make an argument against the use of AI in the scientific process. They believe that the sheer volume of academic articles being produced is putting an immense strain on the peer review process. This limits the capacity for in-depth thought and confuses scientific progress with a skewed notion of academic productivity—scientific progress is quantified by the number of articles produced.
- What are the benefits and limitations of restricting the use of AI in the academic process?
- What do we as academic researchers and students lose by giving over scientific discovery and communication to generative AI systems?
-
- 3 min
- Cyber Security News
- 2025
Tesla’s famous wall charger, which is installed in homes and businesses worldwide, gets hacked through the charging cable on the adapter. The adapter had a previously undocumented feature that allowed Tesla vehicles to update it through the charging cable, and hackers were able to exploit this vulnerability. After being able to execute arbitrary code on the device, hackers may gain access to the local network that the charger is connected to—among other things.
- Cyber Security News
- 2025
-
- 3 min
- Cyber Security News
- 2025
Tesla Wall Connector Hacked in 18 Minute Attack
Tesla’s famous wall charger, which is installed in homes and businesses worldwide, gets hacked through the charging cable on the adapter. The adapter had a previously undocumented feature that allowed Tesla vehicles to update it through the charging cable, and hackers were able to exploit this vulnerability. After being able to execute arbitrary code on the device, hackers may gain access to the local network that the charger is connected to—among other things.
- What measures may be taken by Tesla (besides not documenting the feature altogether) to make the security on the wall adapter more robust?
- What responsibility does Tesla have in this situation towards its customers?
- What next steps should be taken to prevent this vulnerability from being exploited in Tesla wall adapters around the world?
-
- 5 min
- BBC
- 2025
A surgeon in the occupied West Bank talks about how Israeli military drones are coming to neighborhoods and picking off civilians, including injured children near hospitals.
- BBC
- 2025
-
- 5 min
- BBC
- 2025
Drone Use in Ghaza
A surgeon in the occupied West Bank talks about how Israeli military drones are coming to neighborhoods and picking off civilians, including injured children near hospitals.
- In what ways have warfare ethics been changed by the development of AI-based drone technologies ?
- Considering how many types of technologies go into current military drones (CV, spatial navigation, robotics, AI, etc.), who are the responsible parties for the impact of drone warfare? Researchers and developers? Military organizations? Drone pilots?