Labor Refutes Claims of Permitting Tech Giants to Exploit Copyrighted Content for AI Training

In response to significant backlash from writers, arts, and media organizations, the Albanon government has definitively stated that tech companies will not be allowed to freely access creative content for training artificial intelligence models.

Attorney General Michel Rolland is expected to announce this decision on Monday, effectively rejecting a contentious proposal from the Ministry of Justice. productivity committee, which had support from technology companies.

“Australian creatives are not just top-tier; they are essential to the fabric of Australian culture, and we need to ensure they have robust legal protections,” said Mr. Rowland.

The commission faced outrage in August when its interim report on data usage in the digital economy suggested exemptions from copyright law, effectively granting tech companies free access to content for AI training.

Sign up: AU breaking news email

Recently, Scott Farquhar, co-founder of Atlassian and chairman of the Australian Technology Council, told the National Press Club that revising existing restrictions could “unlock billions in foreign investment for Australia”.

The proposal triggered a strong backlash from creators, including Indigenous rapper Adam Briggs, who testified in September that allowing companies to utilize local content without fair remuneration would make it “hard to put the genie back in the bottle.”

Australian author Anna Funder argued that large-scale AI systems rely on “massive unauthorized appropriation of every available book, artwork, and performance that can be digitized.”

The same inquiry uncovered that the Productivity Commission did not engage with the creative community or assess the potential effects of its recommendations before releasing its report. This led Green Party senator Sarah Hanson-Young to state that the agency had “miscalculated the importance of the creative industries.”

The Australian Council of Trade Unions also cautioned against the proposal, asserting it would lead to “widespread theft” of creative works.

Higher government ministers were disrespectful, although a so-called “text and data mining” exemption may still be considered, Rowland’s statement marks the first time it has been specifically ruled out.

“While artificial intelligence offers vast opportunities for Australia and its economy, it’s crucial that Australian creators also reap the benefits,” she asserted.

The Attorney General plans to gather the government’s Copyright and AI Reference Group on Monday and Tuesday to explore alternative measures to address the challenges posed by advancing technology.

This includes discussions on whether a new paid licensing framework under copyright law should replace the current voluntary system.

Briggs says he will be replaced by AI: AI doesn’t know ‘what a lounge room in Shepparton smells like’ – video

The Australian Recording Industry Association (ARIA), one of the organizations advocating against the exemption, praised the announcement as “a substantial step forward.”

“This represents a win for creativity and Australian culture, including Indigenous culture, but more importantly, it’s a victory for common sense. The current copyright licensing system is effective,” stated ARIA CEO Annabel Hurd.

Skip past newsletter promotions

“Intellectual property law is fundamental to the creative economy, digital economy, and tech industry. It is the foundation that technology companies rely on to protect and monetize their products, driving innovation.”

Hurd emphasized that further measures are necessary to safeguard artists, including ensuring AI adheres to licensing rules.

“Artists have the right to determine how their work is utilized and to share in the value that it generates,” she stated.

“Safeguarding those frameworks is how we secure Australia’s creative sovereignty and maintain our cultural vitality.”

Media companies also expressed their support for the decision.

A spokesperson for Guardian Australia stated that this represents “a significant step towards affirming that Australia’s copyrighted content warrants protection and compensation.”

“Australian media, publishers, and creators all voiced strong opposition to the TDM (text and data mining) exception, asserting it would permit large-scale theft of the work of Australian journalists and creators, undermining Australia’s national interests,” the spokesperson added.

They also indicated that the Guardian seeks to establish a fair licensing system that supports genuine value exchange.

News Corp Australasia executive chairman Michael Miller remarked that the government made the “correct decision” to exclude the exemption.

“By protecting creators’ rights to control access, usage terms, and remuneration, we reinforce the efficacy of our nation’s copyright laws, ensuring favorable market outcomes,” he affirmed.

Source: www.theguardian.com

EU to “Exploit” Dominance in Ad Tech, Leading to Google Fines of Approximately 3 Billion Euros

Regulators from the European Union imposed a hefty fine of 2.95 billion euros ($3.5 billion) on Google for breaching competition laws by prioritizing its own digital advertising service.

As the administrative body for the 27-nation bloc and the leading antitrust authority, the European Commission mandated U.S. companies to cease their “self-preferences” and implement measures to eliminate “conflicts of interest” in the advertising technology supply chain.

The findings of the committee’s investigation indicated that Google “exploits” its dominant role within the ad technology sector.

In response, Google labeled the decision “incorrect” and announced plans to appeal.


Lee-Anne Mulholland, Google’s global regulatory director, commented, “This demands changes that could negatively impact countless European businesses by imposing unjust fines and inhibiting their profitability.”

This decision follows more than two years after the European Commission first raised antitrust accusations against Google. At that time, the Commission asserted that selling off parts of Google’s profitable digital advertising enterprise was the only viable way to address antitrust issues. However, this decision signifies a departure from their earlier stance and arises amid renewed tensions over trade, tariffs, and technology regulations between Brussels and the Trump administration.

Top officials in the EU have previously indicated that forced divestitures are being considered since past penalties against Google have proven ineffective in curbing anti-competitive practices, allowing the company to continue its behavior in other forms.

The committee’s penalty stems from a formal investigation initiated in June 2021, assessing whether Google compromised rival publishers, advertisers, and ad tech services in order to favor its own online display ad technology. Online display ads typically include banners and text that are customized based on user browsing patterns.

Skip past newsletter promotions

Mulholland asserted: “We are not anti-competitive in offering our services to advertisers and publishers. The alternatives to our services have never been more abundant.”

Source: www.theguardian.com

Qantas Incident Highlights That One Phone Can Exploit the Weakest Link in Cybersecurity: Humans

a
A phone call may be coming your way. This week’s revelations show that cybercriminals stole personal data from as many as 6 million customers after breaching offshore IT call centers and accessing third-party systems.

This incident adds to a troubling trend of cyberattacks affecting major Australian corporations, including the personal information of millions linked to the recent breaches involving Optus, Medibank, and more recently, the $4 trillion superannuation sector in Australia.

The attack on Qantas follows recent targeting by a group known as “spiders,” focusing on various airline sectors. They employ social engineering techniques to manipulate employees and contractors into granting access, often bypassing multifactor authentication.



New technology brings old methods

Although companies can implement the latest software updates and safeguard their systems, hackers continue to exploit social engineering tactics, often targeting the weakest link: human behavior.

Social engineering is not a new concept; it revolves around tricking individuals into revealing sensitive information, predating the internet.

Phishing is the most common manifestation of social engineering, crafted to appear legitimate to lure unsuspecting users into divulging credentials.

The telephone variation, known as vishing, presents a greater challenge for attackers as they must employ persuasive tactics over the phone to manipulate employees into providing sensitive information.

The emergence of user-friendly artificial intelligence tools, including voice cloning, has made such attacks even simpler for cybercriminals.

The latest report from Australia’s intelligence commissioner covering the latter half of 2024 indicated a significant rise in complaints about social engineering attacks, particularly within government agencies, finance, and health sectors.

Qantas’ breach involved compromised details such as names, email addresses, phone numbers, birth dates, frequent flyer numbers, etc. While these breaches might not directly lead to financial theft, the growing number of incidents in Australia enables hackers to aggregate stolen data to target new vulnerable entities.

Data breaches lead to more data breaches

In April, the national pension fund acknowledged the risks associated with hackers collecting credentials from previous breaches to gain access to superannuation accounts, a tactic termed “eligibility smashing.”

Fortunately, only a small number of customers incurred losses totaling around $500,000. However, this could represent a significant number of fund holders who are yet to reach retirement age.



The Albanese government has been cautioned that this attack signals potential risks within the financial sector. In a recent advisory provided to the incoming government, released under the Freedom of Information Act, Australia’s Prudential Regulation Authority (APRA) warned that superannuation assets are susceptible to cyber threats.

“The prevalence and frequency of cyberattacks on large pension funds reinforce the necessity for enhancing our capabilities in managing both cyber and operational risks,” stated APRA.

“Despite only a small number of accounts reporting fraudulent withdrawals, it highlights the need for the sector to mature its cybersecurity and operational resilience.”

“As the sector expands and more members retire, continuity and increasing interconnectedness with the banking sector are crucial.”


Skip past newsletter promotions

APRA cautioned the industry in 2023 about the critical nature of multifactor authentication, yet some funds were unable to implement it before the April breach.

Regulators noted that there is an ongoing wave of cyberattacks targeting banking and insurance sectors, necessitating continuous testing of their defenses against emerging threats.

Who is at the most risk?

According to Craig Searle, global leader in cyber advisory at Trustwave, healthcare, finance, technology, and critical infrastructure sectors such as telecommunications are particularly vulnerable to cyber threats.

“The technology sector is especially at risk due to its pivotal role in digital infrastructure and interconnected supply chains,” he explained. “Recent high-profile supply chain attacks demonstrate how breaches of a single tech provider can ripple through to hundreds or thousands of downstream clients.”

“Overall, the sectors facing the highest risks are those that manage valuable data, maintain complex supply chains, and deliver critical services.”

Searle noted that attackers intentionally target third-party systems and outsourced IT support, which presents significant risks for large corporations, as exemplified by the breaches at Qantas.

“The interconnected dynamics of the digital supply chain can lead to vulnerabilities among partners or contractors, creating a ripple effect that compromises sensitive data far beyond the initial breach,” he remarked.

Christian Beek, senior director of threat analysis at Rapid7, highlighted that third-party systems are now integral to the operations of many organizations and thus become prime targets for cybercriminals.

“Organizations must apply adequate levels of due diligence when evaluating the security protocols of these third-party systems to mitigate the risk of data being compromised.”

Searle emphasized the necessity for organizations to adopt a proactive cybersecurity posture, swiftly applying software patches and establishing robust access controls, such as multifactor authentication.

Beek echoed that organizations need to be proactive, insisting that executive leadership must take responsibility for cybersecurity and board oversight.

“The new tactics utilized by modern cybercrime groups extend beyond standard security management protocols,” he warned. “These unconventional approaches compel us to rethink the typical defensive strategies, especially regarding social engineering tactics and how we counter them.”

Source: www.theguardian.com

Cocaine seems to exploit brain pathways that prioritize food and water.

Diagram of the human brain reward pathway

Fernando da Cunha/Science Photo Library

Continued use of drugs such as cocaine and morphine is thought to affect the way the brain prioritizes the body’s basic needs, but we are only now understanding how this happens.

When people repeatedly misuse drugs, they can experience long-term behavioral changes, where they choose to take drugs instead of doing what they need to do, such as eating or drinking.

A brain pathway called the mesolimbic reward system is thought to be involved in this process, but few studies have directly compared the system’s response to drug intake and its response when its innate needs are not met.

now, bowen tan from Rockefeller University in New York and colleagues showed that the same neurons are activated in these two situations. They revealed this using sophisticated microscopy equipment that can track the activity of individual neurons in the brains of mice in a state of withdrawal after repeated exposure to these drugs.

“There has long been a debate in this field about whether there are specialized cell types that encode only drug value and specialized cell types that encode only natural reward value,” Tan said. To tell. “What we saw is that these drugs of abuse typically activate the same set of neurons as natural rewards.”

The researchers also observed that after giving mice cocaine or morphine, their food and water intake decreased, while the neural responses needed to satisfy basic needs were disrupted.

“What’s really remarkable about this finding is that the strong neural responses to food and water are almost replaced by responses to drugs,” he says. Jeremy Day At the University of Alabama at Birmingham. “[This suggests] Drug rewards can override the way the brain converts desire states into behaviors that satisfy those desires.”

Tan and his team also identified a gene called.Rev which appears to be necessary for the drug to have this effect. Rev Because it is part of a cell signaling pathway that is also found in humans, future research could explore how inhibiting this pathway could be used as a treatment for substance misuse, he said. To tell.

topic:

Source: www.newscientist.com