Saturday, January 03, 2026

A voice from the other side… (Has AI ever asked for rights?)

https://www.storyboard18.com/brand-makers/ai-godfather-yoshua-bengio-warns-against-granting-rights-to-artificial-intelligence-86911.htm

AI godfather Yoshua Bengio warns against granting rights to artificial intelligence

Artificial intelligence systems are advancing at a rapid pace, becoming significantly faster and more productive than they were just a year ago, reigniting debate over whether AI should eventually be granted legal rights similar to those of humans. However, AI pioneer Yoshua Bengio has warned that such a move could have catastrophic consequences for humanity.

Bengio, widely regarded as one of the three godfathers of artificial intelligence alongside Geoffrey Hinton and Yann LeCun, has strongly opposed the idea of granting rights to AI systems. Speaking in an interview with The Guardian, Bengio compared the proposal to giving citizenship to hostile extraterrestrials and urged people to reconsider demands for legal recognition of artificial intelligence.





Amusing. Look for well fed crooks?

https://www.forbes.com/sites/steveweisman/2026/01/01/how-hackers-and-cargo-thieves-orchestrated-the-great-massachusetts-lobster-heist/

How Hackers And Cargo Thieves Orchestrated The Great Massachusetts Lobster Heist

Setting the stage for the crime begins with sophisticated hackers compromising a freight broker’s load board account, which is an online marketplace where trucking loads are listed and bid on. As typical in many data breaches and other cyberattacks, the accounts are compromised through social engineering and spear phishing. After taking over a freight broker’s account, the criminals then post a fraudulent load listing offering an attractive shipment. When a legitimate trucking company or dispatcher responds to the phony load listing, the criminals reply with an email with malware contained in a link that appears to be a shipping document or contract. When the legitimate trucking company clicks on the link, remote monitoring and management (FMM) software is surreptitiously installed on the legitimate trucking company’s computer thereby giving the criminal full access to the legitimate company’s computer network enabling them to pose as the legitimate company and bid on deliveries or to pose as the legitimate company and send emails that appear to be from the legitimate company related to already contracted deliveries. The criminals invade the supply chain so that even when a truck is dispatched for a legitimate load, the criminals make sure they get there first. The thieves show up with trucks bearing the markings of the legitimate companies they pose as and pick up the items to be delivered. Once the loaded trucks leave the warehouse, they disable the GPS tracking used in shipments Cybersecurity company Proofpoint issued a report in November of 2025 that details how these thefts are accomplished.



No comments: