ISIS Will Benefit from U.S. Withdrawal | Risky Old Code | Weak Border Privacy Protection, and more

A Race to the Bottom of Privacy Protection: The U.S.-U.K. Deal Would Trample Cross Border Privacy Safeguards (Katitza Rodriguez and Camille Fischer, EFF)
Last year, we warned that the passage of the Clarifying Lawful Overseas Use of Data (CLOUD) Act would weaken global privacy standards, opening up the possibility of more permissive wiretapping and data collection laws. Today’s announcement of the U.S.-UK Agreement is the first step in a multi-country effort to chip away at privacy protections in favor of law enforcement expediency.
U.S. Attorney General William Barr and British Home Secretary Priti Patel announced that the U.S. and UK have signed an agreement that will allow each country to bypass the legal regimes of the other and request data directly from companies in certain investigations. The text of the agreement has not yet been released, but the countries were able to enter into such a regime through the controversial powers granted in the U.S. CLOUD Act and the UK Investigatory Powers Act and the 2019 Crime (Overseas Production Orders) Act. At EFFwe fought against the provisions in these bills that weaken global privacy standards, and we are concerned based on the U.S. and UK press statement that this agreement will not include necessary privacy provisions.
Based on reporting, the U.S.-UK agreement sets up a regime in which the UK police can get fast, direct access to communications data about non-U.S. persons held by American tech companies. In return, the United States government will be given fast-track access to British companies’ data regardless of where that data is stored. This unprecedented arrangement will seriously undermine privacy and other human rights.  

Don’t Believe Your Eyes (or Ears): The Weaponization of Artificial Intelligence, Machine Learning, and Deepfakes (Joe Littell, War on the Rocks)
For thousands of years, humanity has relied on five senses to determine threats to their wellbeing. Our ancestors used their keen senses of sight and hearing to assess risk or identify a suitable meal. With the advent of new technologies, however, this reliability may be slipping away. Many algorithms are already in the wild, available freely on open source repositories like Github or Bitbucket. Programs, such as FaceSwap, are ready to be weaponized against individual citizens, corporations, and nations.
There is a very real threat to national security and human life in the application of artificial intelligence, machine learning, and deepfakes. As such, nations should rethink how they counter new vulnerabilities with special capabilities that are spread throughout defense, intelligence, academia, and industry.

The U.S. Gives Military Aid to Corrupt Countries All the Time (Kathy Gilsinan, The Atlantic)
Military assistance deserves more scrutiny in many cases. Ukraine is nowhere near the most important.

Decades-Old Code Is Putting Millions of Critical Devices at Risk (Lily Hay Newman, Wired)
Nearly two decades ago, a company called Interpeak created a network protocol that became an industry standard. It also had severe bugs that are only now coming to light.