Works just earlier today speaking at the Munich Security Conference in germany u. S. Speaker of the house nancy pelosi pressuring other countries to ban it take a listen. China is seeking to exploit its digital autocracy to its tell a crucial telephone giant. Threatening economic retaliation against those who deny. Their technologies allowing the certification of 5 g. Would be to choose like tough over democracy must instead move to an internet of internationalization. So weve heard all this before germany doesnt buy the u. K. Doesnt buy it meanwhile the pentagon today backed away remember the pentagon had said that they were going to encourage the you know us companies that work well wake be allowed to continue to do so and they were i would have issuing some waivers to microsoft as one of the right but now theyve weve walked that back in light again but just because youre indicted doesnt mean theres evidence of it that has to shake out in court and just because an allegation is made
Talk about their book the ethical algorithm. I think a day does not go by in the news or otherwise or in our own work when the subject of algorithmic fairness or privacy is not frontpage news. Today were going to speak to the two leading lights in that area and theyre going to help us understand whatthe stateoftheart is now and what the stateoftheart will be going forward. With that, i think we will welcome Michael Kearns first to the stage. Michael kearns andaaron roth, welcome to the stage. [applause] good morning, thanks to everyone for coming. My name is Michael Kearns and with my close friend and colleague erin roth we have coauthored a book, a general audience book called the ethical algorithm subtitle is the science of socially aware algorithm design. So we want to do for roughly half an hour or so is take you at a high level through what some of the major themes of the book are and then we will open it up as jeff said to q a. So i think many, many people and certainly this audi
Its similar to around claims that since at least 2009 while way has been able to covertly access mobile phone networks around the world using back doors designed for use by Law Enforcement u. S. Intelligence agencies claim that while way has built equipment that secretly preserves its ability to Access Networks through these interfaces without carrier knowledge though these officials still have not provided details of where they believe while we was able to do so now this is important because these 2 stories are actually completely unrelated and yet the timing of the journal story about access to back doors and the federal indictment of intellectual property seems to have been designed to conflate the 2 into one story again it is not and thirdly these 2 stories are not the same as the claim that wall way is spying on behalf of the Chinese Government. And while we continue to insist that they do not. Spy for the Chinese Government for their part while way is pushing back against this ne
Thirdly these 2 stories are not the same as the claim that wall way is spying on behalf of the Chinese Government. And while we continue to insist that they do not spy for the Chinese Government for their part while way is pushing back against this new indictment they stated that this new indictment as part of the Justice Department meant to attempt to err of accompli damage while ways that reputation and its business for reasons related to competition rather than Law Enforcement and that the racketeering enterprise that the government charged today is nothing more than a contrived repackaging of a handful of civil allegations that are almost 20 years old. So here we are in this moment where this week i mean you could call it a very bad week for awhile way but in some ways as a journalist when youre looking at the story and i think its a failure of our media is to challenge what the government is saying look of while way is guilty of doing what the u. S. Government says why. We should
Welcome. Welcome to the Keystone Strategy transformative ideas lectureseries. Were lucky today to be hosted with cspan2. A couple housekeeping notes. When we get to q a there are microphones so raise your hand and the microphone will come to you and then the questions will be captured. So today we are extremely lucky to have Michael Behrens and erin ross, both from the university of pennsylvania here to talk about their book the ethical algorithm. I think a day does not go by in the news or otherwise or in our own work when the subject of algorithmic fairness or privacy is not frontpage news. Today were going to the two leading lights in that area and theyre going to help us understand what the stateoftheart is now and what the stateoftheart will be going forward. With that i think we will welcome professor Michael Kearns first to the stage, is that right . Great. Michael and erin,welcome to the stage. Okay, good morning. Thanks to everyone for coming. My name is michaelkearns and with