Paris AI Safety Breakfast #3: Yoshua Bengio
The third of our 'AI Safety Breakfasts' event series, featuring Yoshua Bengio on the evolution of AI capabilities, loss-of-control scenarios, and proactive vs reactive defense.
Welcome to theDelaware Journal of Corporate Law
JURIX2024 | MUNI LAW
Masaryk University hosts international conference on legal knowledge and information systems, JURIX 2024, in Brno, Czechia.
Challenging Parole Decisions in England and Wales: Reconsideration and Set Aside
Of all the reforms to parole in England and Wales that were introduced after the furore surrounding the 2017 decision to direct the release of the so-called ‘Black cab rapist’, John Worboys, perhaps the most important was the creation in...
There Can Be Only Two (Verdicts): The Presumption of Innocence and Jury Verdicts in Criminal Trials
Rethinking Reasonableness in Rape Prosecution: Lessons Learned in the Search for ‘End to End’ Justice in England and Wales
Across several legal jurisdictions, the history of rape investigation and prosecution is one replete with points of crisis and condemnation, leading to high-profile reviews and reform. This article draws on original data that explores prosecutorial processes and decision-making in the...
Anthropic
The Verge is about technology and how it makes us feel. Founded in 2011, we offer our audience everything from breaking news to reviews to award-winning features and investigations, on our site, in video, and in podcasts.
Policy
Tech is reshaping the world — and not always for the better. Whether it’s the rules for Apple’s App Store or Facebook’s plan for fighting misinformation, tech platform policies can have enormous ripple effects on the rest of society. They’re...
Security
Cybersecurity is the rickety scaffolding supporting everything you do online. For every new feature or app, there are a thousand different ways it can break – and a hundred of those can be exploited by criminals for data breaches, identity...
AI
Artificial intelligence is more a part of our lives than ever before. While some might call it hype and compare it to NFTs or 3D TVs, AI is causing a sea change in nearly every part of the technology industry....
Anthropic and the Pentagon are reportedly arguing over Claude usage
The apparent issue: whether Claude can be used for mass domestic surveillance and autonomous weapons.
Named Entity Recognition for Payment Data Using NLP
arXiv:2602.14009v1 Announce Type: new Abstract: Named Entity Recognition (NER) has emerged as a critical component in automating financial transaction processing, particularly in extracting structured information from unstructured payment data. This paper presents a comprehensive analysis of state-of-the-art NER algorithms specifically...
Hiding in Plain Text: Detecting Concealed Jailbreaks via Activation Disentanglement
arXiv:2602.19396v1 Announce Type: new Abstract: Large language models (LLMs) remain vulnerable to jailbreak prompts that are fluent and semantically coherent, and therefore difficult to detect with standard heuristics. A particularly challenging failure mode occurs when an attacker tries to hide...
An Agentic LLM Framework for Adverse Media Screening in AML Compliance
arXiv:2602.23373v1 Announce Type: new Abstract: Adverse media screening is a critical component of anti-money laundering (AML) and know-your-customer (KYC) compliance processes in financial institutions. Traditional approaches rely on keyword-based searches that generate high false-positive rates or require extensive manual review....
SuperLocalMemory: Privacy-Preserving Multi-Agent Memory with Bayesian Trust Defense Against Memory Poisoning
arXiv:2603.02240v1 Announce Type: new Abstract: We present SuperLocalMemory, a local-first memory system for multi-agent AI that defends against OWASP ASI06 memory poisoning through architectural isolation and Bayesian trust scoring, while personalizing retrieval through adaptive learning-to-rank -- all without cloud dependencies...
AegisUI: Behavioral Anomaly Detection for Structured User Interface Protocols in AI Agent Systems
arXiv:2603.05031v1 Announce Type: new Abstract: AI agents that build user interfaces on the fly assembling buttons, forms, and data displays from structured protocol payloads are becoming common in production systems. The trouble is that a payload can pass every schema...
Detection of Illicit Content on Online Marketplaces using Large Language Models
arXiv:2603.04707v1 Announce Type: new Abstract: Online marketplaces, while revolutionizing global commerce, have inadvertently facilitated the proliferation of illicit activities, including drug trafficking, counterfeit sales, and cybercrimes. Traditional content moderation methods such as manual reviews and rule-based automated systems struggle with...
The Non-Punishment Principle and Restorative Justice
The non-punishment principle is a legal norm that has increasingly gained legitimacy over the past quarter-century within international, regional, and domestic law on human trafficking. At its core, this principle opposes the punishment of human trafficking victims for unlawful conduct...
The Constitutionality of Indiscriminate Data Surveillance
Soon enough, the police will have the capacity to know almost everything about everyone. Not because most of us are suspected of doing anything wrong, but because indiscriminate data surveillance—“indiscriminate” meaning precisely that it is not driven by individualized suspicion...
Justices poised to adopt exceptions to federal criminal defendants’ appellate waivers
The Supreme Court heard oral argument on Tuesday in Hunter v. United States about what exceptions exist to federal defendants’ waivers of their right to appeal. The justices seemed poised […]The postJustices poised to adopt exceptions to federal criminal defendants’...
Microsoft, Google, Amazon say Anthropic Claude remains available to non-defense customers
Trump's Department of War feud with Anthropic won't impact other companies that are using Claude via Microsoft and Google products.
Anthropic’s Pentagon deal is a cautionary tale for startups chasing federal contracts
The Pentagon has officially designated Anthropic a supply-chain risk after the two failed to agree on how much control the military should have over its AI models, including its use in autonomous weapons and mass domestic surveillance. As Anthropic’s $200...
Anthropic vs. the Pentagon, the SaaSpocalypse, and why competitions is good, actually
The Pentagon has officially designated Anthropic a supply-chain risk after the two failed to agree on how much control the military should have over its AI models, including its use in autonomous weapons and mass domestic surveillance. As Anthropic’s $200...
Anthropic to challenge DOD’s supply-chain label in court
Anthropic CEO Dario Amodei said he plans to challenge the Department of Defense's designation of the AI firm as a supply-chain risk. He claims most Anthropic customers are unaffected by the label.
It’s official: The Pentagon has labeled Anthropic a supply-chain risk
The Department of Defense has officially labeled Anthropic a supply-chain risk, making the AI firm the first American company with the label. Meanwhile, the DOD continues to use Anthropic's AI in Iran.
Anthropic CEO Dario Amodei could still be trying to make a deal with Pentagon
Anthropic's $200 million contract with the Department of Defense broke down due to disagreements over giving the military unrestricted access to its AI.
Fragile Thoughts: How Large Language Models Handle Chain-of-Thought Perturbations
arXiv:2603.03332v1 Announce Type: new Abstract: Chain-of-Thought (CoT) prompting has emerged as a foundational technique for eliciting reasoning from Large Language Models (LLMs), yet the robustness of this approach to corruptions in intermediate reasoning steps remains poorly understood. This paper presents...
Why Do Unlearnable Examples Work: A Novel Perspective of Mutual Information
arXiv:2603.03725v1 Announce Type: new Abstract: The volume of freely scraped data on the Internet has driven the tremendous success of deep learning. Along with this comes the growing concern about data privacy and security. Numerous methods for generating unlearnable examples...
LEA: Label Enumeration Attack in Vertical Federated Learning
arXiv:2603.03777v1 Announce Type: new Abstract: A typical Vertical Federated Learning (VFL) scenario involves several participants collaboratively training a machine learning model, where each party has different features for the same samples, with labels held exclusively by one party. Since labels...
Structure-Aware Distributed Backdoor Attacks in Federated Learning
arXiv:2603.03865v1 Announce Type: new Abstract: While federated learning protects data privacy, it also makes the model update process vulnerable to long-term stealthy perturbations. Existing studies on backdoor attacks in federated learning mainly focus on trigger design or poisoning strategies, typically...