<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Ingrid Burrington | The Verge</title>
	<subtitle type="text">The Verge is about technology and how it makes us feel. Founded in 2011, we offer our audience everything from breaking news to reviews to award-winning features and investigations, on our site, in video, and in podcasts.</subtitle>

	<updated>2018-04-26T17:36:05+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.theverge.com/author/ingrid-burrington" />
	<id>https://www.theverge.com/authors/ingrid-burrington/rss</id>
	<link rel="self" type="application/atom+xml" href="https://www.theverge.com/authors/ingrid-burrington/rss" />

	<icon>https://platform.theverge.com/wp-content/uploads/sites/2/2025/01/verge-rss-large_80b47e.png?w=150&amp;h=150&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Ali Winston</name>
			</author>
			
			<author>
				<name>Ingrid Burrington</name>
			</author>
			
			<title type="html"><![CDATA[A pioneer in predictive policing is starting a troubling new project]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2018/4/26/17285058/predictive-policing-predpol-pentagon-ai-racial-bias" />
			<id>https://www.theverge.com/2018/4/26/17285058/predictive-policing-predpol-pentagon-ai-racial-bias</id>
			<updated>2018-04-26T13:36:05-04:00</updated>
			<published>2018-04-26T13:36:05-04:00</published>
			<category scheme="https://www.theverge.com" term="Verge Archives" />
							<summary type="html"><![CDATA[Jeff Brantingham is as close as it gets to putting a face on the controversial practice of &#8220;predictive policing.&#8221; Over the past decade, the University of California-Los Angeles anthropology professor adapted his Pentagon-funded research in forecasting battlefield casualties in Iraq to predicting crime for American police departments, patenting his research and founding a for-profit company [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Garret Beard" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/10302845/gbeard_2253_001_social.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Jeff Brantingham is as close as it gets to putting a face on the controversial practice of &ldquo;predictive policing.&rdquo; Over the past decade, the University of California-Los Angeles anthropology professor adapted his Pentagon-funded research in forecasting battlefield casualties in Iraq to predicting crime for American police departments, patenting his research and founding a for-profit company named PredPol, LLC.</p>

<p>PredPol quickly became one of the market leaders in the nascent field of crime prediction around 2012, but also came under fire from activists and civil libertarians who argued the firm provided a sort of &ldquo;tech-washing&rdquo; for racially biased, ineffective policing methods.</p>

<p>Now, Brantingham is using military research funding for another tech and policing collaboration with potentially damaging repercussions: using machine learning, the Los Angeles Police Department&rsquo;s criminal data, and an outdated gang territory map to automate the classification of &ldquo;gang-related&rdquo; crimes.</p>

<p>Being classified as a gang member or related to a gang crime can result in additional criminal charges, heavier prison sentences, or inclusion in a civil gang injunction that restricts a person&rsquo;s movements and ability to associate with other people. Generally, law enforcement determines gang links through a highly subjective, individualized assessment of criminal histories, arrests, interviews, and other intelligence. In recent years, activists in California, Illinois, and other states have pushed back against gang policing measures such as databases and gang injunctions, and in the case of California, <a href="https://www.revealnews.org/blog/legislature-approves-ground-breaking-transparency-for-california-gang-database/">succeeded</a> in winning residents the right to review and appeal their gang classification.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>Being classified as a gang member or related to a gang crime can result in additional criminal charges</p></blockquote></figure>
<p>But in a paper on &ldquo;<a href="http://www.aies-conference.com/wp-content/papers/main/AIES_2018_paper_93.pdf">Partially</a> Generative Neural Networks for Gang Crime Classification&rdquo; presented in February at the inaugural <a href="http://www.aies-conference.com/">Artificial</a> Intelligence, Ethics, and Society (AIES) conference, Brantingham and his co-authors propose automating this complex and subjective assessment.</p>

<p>The paper attempts to predict whether crimes are gang-related using a neural network, a complex computational system modeled after a human brain that &ldquo;learns&rdquo; to classify or identify items based on ingesting a training dataset. The authors selected what they determined to be the four most important features (number of suspects, primary weapon used, the type of premises where the crime took place, and the narrative description of the crime) for identifying a gang-related crime from 2014&ndash;16 LAPD data and cross-referenced the crime incidents with a 2009 LAPD map of gang territory to create a training dataset for their neural network.</p>

<p>Researchers tested the accuracy of the network&rsquo;s predictions by seeing how well it classified crime data without one key feature: the narrative text description of the crime, the most time-consuming data for police to collect. This is where the &ldquo;partially generative&rdquo; aspect in the title comes in. In the absence of a written description, the neural network generates new text &mdash; effectively, an algorithmically written crime report based on the three other features used in the training model. The generated text isn&rsquo;t actually <em>read</em> by anyone, nor is it presumed to provide meaningful narrative context replacing a police report, but it is turned into a mathematical vector and incorporated into a final prediction of whether a crime is gang-related.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>Effectively, an algorithmically written crime report</p></blockquote></figure>
<p>This paper is the first to be published by a research team co-led by Brantingham studying &ldquo;<a href="https://www.cais.usc.edu/projects/gametheory/">Spatio</a>-Temporal Game Theory &amp; Real-Time Machine Learning for Adversarial Groups&rdquo; at the University of Southern California&rsquo;s Center for Artificial Intelligence and Society (CAIS). CAIS&rsquo; mission states a goal of &ldquo;[sharing] our ideas about how AI can be used to tackle the most difficult societal problems.&rdquo;</p>

<p>Funding for the USC research team that includes Brantingham&rsquo;s project comes from the Minerva Initiative, a Pentagon research program intended to improve the military&rsquo;s understanding of social, political, and behavioral drivers of conflict. According to the <a href="http://minerva.defense.gov/Minerva/Objectives/">Minerva</a> Initiative website, funding is provided to projects that address &ldquo;specific topic areas determined by the Secretary of Defense.&rdquo; Via email, CAIS co-founder and paper co-author Milind Tambe said that the Minerva grant for this project is &ldquo;roughly&rdquo; $1.2 million, to be distributed over three years.</p>

<p>The website for the research team&rsquo;s efforts, including the gang classification paper, opens with references to ISIS and Jabhat al-Nusra before shifting to the terrain of Los Angeles street gangs, a conflation that echoes Brantingham&rsquo;s earlier DOD-funded work that led him to co-founding PredPol. PredPol has sold its services to police everywhere from California to Georgia, as well as the United Kingdom. In 2015, <a href="https://www.revealnews.org/article/arizona-bill-would-fund-predictive-policing-technology/">PredPol</a> unsuccessfully lobbied the Arizona legislature to approve a $2 million appropriation bill to use the firm&rsquo;s forecasting technology to predict gang activity.</p>

<p>First reported in <a href="http://www.sciencemag.org/news/2018/02/artificial-intelligence-could-identify-gang-crimes-and-ignite-ethical-firestorm"><em>Science</em></a>, the paper met with significant concern over its ethical implications. However, reporting on the paper and its fallout made no mention of Brantingham&rsquo;s business connections to PredPol or the military funding of his past and present research.</p>

<p>When asked in a phone interview about whether this research might inform future business endeavors, Brantingham said, &ldquo;This is a separate project, and that&rsquo;s how we&rsquo;re thinking about it.&rdquo; Pointing out that it took a decade for his previous military-funded research to become PredPol, Brantingham emphasized that the paper reflected very preliminary work. &ldquo;It&rsquo;s our job to do careful basic research and make sure we understand how and why things are the way they are, long before any thoughts of use in the field might be contemplated.&rdquo;</p>

<p>However preliminary the research might be and however good its authors&rsquo; intentions are, the paper and Brantingham&rsquo;s involvement raise eyebrows with critics of increasingly automated data-driven policing tech.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>“Any time you take out the human perspective or interaction, I don’t believe there’s any positives.”</p></blockquote></figure>
<p>Aaron Harvey, a San Diego resident and activist who successfully fended off charges of gang conspiracy from the local prosecutor that could have landed him in prison for over a decade, has since become a prominent California activist pushing back against the state&rsquo;s gang laws, which are the oldest and most severe in the United States.</p>

<p>&ldquo;Any time you take out the human perspective or interaction, I don&rsquo;t believe there&rsquo;s any positives,&rdquo; Harvey said of Brantingham&rsquo;s research. Aside from removing human discretion from the process, Harvey believed that automating such decisions based on historical criminal data from police departments alone would only reinforce past allegations of gang involvement, whether they were true or not. &ldquo;You&rsquo;re making algorithms off a false narrative that&rsquo;s been created for people &mdash; the gang documentation thing is the state defining people according to what they believe,&rdquo; Harvey said. &ldquo;When you plug this into the computer, every crime is gonna be gang-related.&rdquo;</p>

<p>Christo Wilson, assistant professor in computer and information science at Northeastern University and a co-organizer of the Fairness, Accountability, and Transparency in Machine Learning conference, also has concerns about the model&rsquo;s potential to reinforce errors and biases. &ldquo;If I train a model to predict people&rsquo;s height, we know how to interpret the output and gauge its accuracy.&rdquo; But, Wilson noted, &ldquo;gang-related&rdquo; is a complex, subjective determination. &ldquo;So the algorithm is accurate at predicting what? Whether LAPD officers would label a crime as gang-related. Now, maybe the LAPD is 100 percent objective in their determinations of what is and is not gang-related. But if they are not, then the algorithm is going to reproduce their errors and biases.&rdquo;</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>“So the algorithm is accurate at predicting what? Whether LAPD officers would label a crime as gang-related”</p></blockquote></figure>
<p>There is ample evidence in the public record of widespread inaccuracies in gang data &mdash; a <a href="https://www.revealnews.org/blog/california-state-auditor-rampant-flaws-in-gang-database/">2016 state audit of California&rsquo;s CalGang database</a> found rampant errors, files that should have been purged years earlier, and unsubstantiated claims of gang involvement.</p>

<p>Micha Gorelick, senior research engineer at machine intelligence research company Cloudera Fast Forward Labs, adds a further objection: the training data assumes gang territories haven&rsquo;t shifted in at least five years.&nbsp;When asked about the use of the 2009 map with 2014-16 crime data, Brantingham said that it was the most recent one available to him and that &ldquo;There is some movement of territories over time but not as much as you would think, actually.&rdquo;</p>

<p>Harvey, who grew up in the Blood-affiliated neighborhood of Lincoln Park in southeast San Diego, pointed out that gang territories and allegiances are highly fluid, and five years is an eternity in street life. &ldquo;You&rsquo;re able to come up with a conclusion of something and never have that on-the-ground interaction with the community,&rdquo; Harvey said of Brantingham&rsquo;s research approach.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>“Encoding racial bias.”</p></blockquote></figure>
<p>Gorelick says many of the technical decisions in the paper are overly simplistic and technically rudimentary, but he believes the gang territory map is &ldquo;the most nefarious of the features used.&rdquo; Evaluating the likelihood a crime is gang-related based on a blanket labeling of a neighborhood as a gang territory &ldquo;is encoding geographic bias, which, especially in a place like LA, is encoding racial bias.&rdquo;</p>

<p>Wilson also pointed out that the paper fails to incorporate documented approaches to evaluating biased outcomes in machine learning: &ldquo;The authors could have [looked at] whether their algorithm achieves statistical parity across races and ethnicities &hellip; They also could have looked for so-called disparate mistreatment by looking to see if the classification errors are evenly spread across these groups. But they did none of this, even though the methods to do so are well-known in the fair algorithms and even the predictive policing literature.&rdquo;</p>

<p>As for Brantingham&rsquo;s and his co-authors&rsquo; insistence of how preliminary this research is, Wilson noted a similar defense was used for controversial research using AI to identify <a href="https://www.theguardian.com/technology/2017/sep/07/new-artificial-intelligence-can-tell-whether-youre-gay-or-straight-from-a-photograph">sexual orientation</a> or <a href="https://www.telegraph.co.uk/technology/2016/11/24/minority-report-style-ai-learns-predict-people-criminals-facial/">criminality</a>. Like Brantingham&rsquo;s paper, &ldquo;both of these studies also had fundamental methodological problems. But that doesn&rsquo;t obviate the essential ethics of the research itself: should we be doing this research at all?&rdquo;</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>“Should we be doing this research at all?”</p></blockquote></figure>
<p>Milind Tambe of USC&rsquo;s Center for Artificial Intelligence and Society emphasized that his research center, which houses Brantingham&rsquo;s new research and collaborates with the university&rsquo;s school of social work, &ldquo;focuses on AI for Social Good&rdquo;, and that this preliminary research contributes to improving domain understanding to facilitate said social good. But the number of criticisms of the technical and ethical shortcomings of the paper raises questions about whose version of social good is being served by this research.</p>

<p>For years, PredPol has been plagued with criticisms over the paucity of depth, richness, and rigor the software brings to policing. This new line of research suggests that Brantingham has not taken critiques of his research methodology to heart and is pressing forward with a project that is founded on incomplete data, dubious methods, and a premise that, if applied in the field, could result in more people of color behind bars.</p>

<p><strong>Correction:</strong><em> An earlier version of this report quoted Hau Chan, one of the researchers involved in the 2018 AIES paper, as responding to ethical concerns by saying &ldquo;I&rsquo;m just an engineer,&rdquo; which he did not say. The erroneous quote was based on a transcription error in the Science report that originally reported the remarks. Chan&rsquo;s remarks are more accurately quoted as &ldquo;as a&nbsp;researcher I don&rsquo;t know what&rsquo;s the appropriate answer for that question.&rdquo; The erroneous quote has been removed, and copy has been updated with accurate context. </em>The Verge<em> regrets the error.</em></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Ingrid Burrington</name>
			</author>
			
			<title type="html"><![CDATA[The internet apocalypse map hides the major vulnerability that created it]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2016/10/24/13380448/ddos-dyn-attack-internet-infrastructure" />
			<id>https://www.theverge.com/2016/10/24/13380448/ddos-dyn-attack-internet-infrastructure</id>
			<updated>2016-10-24T10:10:35-04:00</updated>
			<published>2016-10-24T10:10:35-04:00</published>
			<category scheme="https://www.theverge.com" term="Report" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[During Friday&#8217;s massive distributed denial of service (DDoS) attack on DNS service provider Dyn, one might be forgiven for mistaking the maps of network outages for images of some post-apocalyptic nuclear fallout. Screenshots from sites like downdetector.com showed menacingly red, fuzzy heat maps of, well, effectively just population centers of the United States experiencing serious [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="A Level3 map of the US detailing internet outages and disruptions." data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/7322903/level-3-outage-map-screenshot-ddos-1.png?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>During Friday&rsquo;s massive distributed denial of service (DDoS) attack on DNS service provider Dyn, one might be forgiven for mistaking the maps of network outages for images of some post-apocalyptic nuclear fallout. Screenshots from sites like <a href="http://downdetector.com/status/dyn/news/82009-problems-at-dyn">downdetector.com</a> showed menacingly red, fuzzy heat maps of, well, effectively just population centers of the United States experiencing serious difficulty accessing Twitter, Github, Etsy, or any of Dyn&#8217;s other high-profile clients. Aside from offering little detail and making a DDoS literally into a glowing red menace, they also obscured the reality of just how centralized a lot of internet infrastructure really is. DNS is ground zero for the uneasy tension of the internet&rsquo;s presumed decentralized resilience and the reality that as of now, translating IP addresses into domain names requires some kind of centralized, hierarchical platform, and that&rsquo;s probably not going to radically change anytime soon.</p>

<p>Other maps provided by various business to business network infrastructure companies weren&rsquo;t much more helpful. These maps seem to exist mostly to signal that the companies in question have lots of cool data and that it can be made into a flashy map &mdash; which might impress potential customers, but that doesn&rsquo;t offer a ton of insights for the layperson. For example, threat intelligence company <a href="http://map.norsecorp.com/">Norse&#8217;s map</a> appears to be mostly a homage to the Matthew Broderick movie <em>War Games:</em> a constant barrage of DDoS attacks beaming like space invader rockets across a world map. Akamai has an impressive <a href="http://wwwnui.akamai.com/gnet/globe/index.html">3D visualization</a> that renders traffic as points beaming into the atmosphere. And website monitoring service <a href="https://www.pingdom.com/livemap">Pingdom</a> offers a dot map at such a far-out zoom level that it&#8217;s essentially useless for seeking out more meaningful patterns than &#8220;outages happen in population centers, also there are a lot of outages.&#8221;</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>Internet outage maps don’t necessarily show where the infrastructure lives</p></blockquote></figure>
<p>That being said, those population centers are only one piece of reading the patterns of outage maps. A lot of those higher-density population areas also happen to be home to a lot of internet exchanges (in industry parlance, IXes) &mdash; buildings where different internet providers connect their networks to one another. When you type twitter.com into a browser, your computer&rsquo;s request for content from twitter.com has to eventually leave your ISP&rsquo;s network, go to Twitter&rsquo;s network, and then return to your network. An internet exchange is basically where that handoff happens. Telegeography has a <a href="http://internetexchangemap.com">really nice map</a> of all of them.</p>

<p>The locations of internet exchanges tend to follow population hubs because the routes of internet connectivity often follow older routes of telephone connectivity (which themselves often follow telegraph routes, railways, and highways). In turn, internet exchanges attract data centers and more network infrastructure. For dense coastal areas, some internet exchanges are also key switch points for data traveling across transoceanic submarine cables, as in the case of Manhattan&rsquo;s <a href="http://www.datacenterknowledge.com/archives/2013/09/24/major-expansion-for-telx-at-60-hudson-street/">60 Hudson Street</a> or Los Angeles&rsquo; <a href="http://www.one-wilshire.com/explore-one-wilshire/building-information/">One Wilshire</a>. In all likelihood, devices used for Friday&rsquo;s DDoS attack located across the Atlantic or Pacific probably passed through or possibly connected to Dyn&rsquo;s network through these buildings.</p>

<p>That being said, some of the overlaps between population centers and network outages are more a reflection of the number of connections in an area than the number of humans living there. The Portland, Oregon metro area has <a href="http://internetexchangemap.com/#/metro-area/portland">six IXes</a>. So does <a href="http://internetexchangemap.com/#/metro-area/new-york">Manhattan</a>, which is surrounded by nine additional IXes in the surrounding metro areas of New Jersey and Long Island. Dallas, Silicon Valley, and Seattle were all areas that were subsumed by the grim red cloud of No Tweets For You in outage maps yesterday.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>What the maps don’t show are anomalies of history</p></blockquote></figure>
<p>What the maps don&rsquo;t show are the anomalies of history that, today, are deeply entrenched network geography. Ashburn, Virginia, which lies about 45 minutes outside of DC and not exactly what most would call a major population hub (less than 50,000 people) has<a href="http://internetexchangemap.com/#/building/18799"> eight IXes</a>. Suburban northern Virginia is a <a href="http://www.theatlantic.com/technology/archive/2016/01/amazon-web-services-data-center/423147/">major chokepoint for internet traffic</a> in part due to an accident of internet history, one that perpetuates itself because of that tendency of networks to follow other networks.</p>

<p>Looking at Dyn&rsquo;s own highly stylized map of the <a href="http://dyn.com/dns/network-map/">locations of its DNS servers</a>, the company also followed the existing infrastructure, placing its equipment in proximity to major IX regions and infrastructure hubs.</p>

<p>Ironically, the company that offers some of the more legible visualizations and comprehensive analysis of where internet outages start and how they proliferate across a network is actually Dyn itself; since 2014, Dyn has maintained a <a href="http://research.dyn.com">research arm</a> exclusively dedicated to studying internet performance data and observing global events and trends online. If you&#8217;ve seen a story pass through your timeline about internet outages in Turkey or Syria in the past year, the data behind that story very likely came from Dyn Research. And that data about network traffic is one of the reasons so many companies come to Dyn: they have, essentially, one of the most detailed maps of the internet, and they help massive companies navigate that map efficiently, whether through DNS services or helping companies figure out where to locate their data centers.</p>

<p>And it&rsquo;s not clear that such an attack would have been less devastating if Dyn were a smaller actor or its clients were rolling their own domain name servers. DNS is annoying and tedious and arguably the least sexy technical problem on the internet. &ldquo;DNS is a 30-year-old protocol. We just manage it,&rdquo; Kyle York, chief strategy officer at DNS service provider Dyn, noted via phone. They happen to manage it really, really well, which is in part what made yesterday&rsquo;s DDoS so significant. &ldquo;We&rsquo;re the best in the world at this and it brought us to our knees,&rdquo; York said. Not to downplay the significance of the attack, but Dyn &ldquo;at its knees&rdquo; in this context means &ldquo;resuming normal operations in less than 24 hours.&rdquo; How many other companies could say the same? If Twitter, Github, AWS, and all of Dyn&rsquo;s other clients were separately, simultaneously hit with the same scale of DDoS attack on their nameservers, would they have done any better at fending it off than a single company that specializes in this stuff?</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>A day of cyberwar infamy?</p></blockquote></figure>
<p>October 21st, 2016 is a day that may or may not not live in cyberwar infamy, but the DDoS was unexpectedly successful in uniting the community of mostly unnoticed and often forgotten people who work on maintenance of core internet infrastructure. It certainly united the 430-some employees at Dyn. York, sounding pretty tired (although, he apologetically informed me during the call, he also was wrangling a four-year-old on a Saturday morning), described the day as an &ldquo;emotional rollercoaster&rdquo; in which everyone was on deck. &ldquo;Accountants were volunteering to help the customer service team, sales people were cheering on our NOC [network operations center] team,&rdquo; York said. It&rsquo;s not quite the thrilling war story of generations past, but it echoes the general uniting of voices from infrastructure, standards, and the security community, who have been concerned about the possibility of attacks like this for years.</p>

<p>But Dyn&#8217;s not especially interested in being a cyberwar hero or a household name. As Dyn&rsquo;s founder Jeremy Hitchcock <a href="https://twitter.com/jhitchco/status/789576877937659904">tweeted</a> last night, &#8220;We like to just run the Internet and stay out of the news.&#8221; Perhaps fortunately for Hitchcock, most of the media attention on this attack is turning more and more toward its source, an Internet of Things botnet orchestrated by unknown actors. Unfortunately for Hitchcock and for Dyn, based on reports about the attack itself, it doesn&rsquo;t sound like IoT-based botnets are going to be a one-time thing in DDoS attacks of this scale, and that might make it a lot harder for Dyn to just run the internet and stay out of the news.</p>
						]]>
									</content>
			
					</entry>
	</feed>
