Artificial Intelligence: Short History, Present Developments, and Future Outlook Final Report

Total Page:16

File Type:pdf, Size:1020Kb

Artificial Intelligence: Short History, Present Developments, and Future Outlook Final Report Preface Artificial Intelligence: Short History, Present Developments, and Future Outlook Final Report January 2019 Study Committee Dave Martinez, Co-Lead Andre King Nick Malyska,Co-Lead Rich Lippmann Bill Streilein,Co-Lead Benjamin Miller Rajmonda Caceres Doug Reynolds William Campbell Fred Richardson Charlie Dagli Cem Sahin Vijay Gadepally An Tran Kara Greenfield Pierre Trepagnier Robert Hall Joe Zipkin MIT LL Review Team Christopher Roeser, Lead Sanjeev Mohindra Konstantinos Hennighausen Jason Thornton DISTRIBUTION STATEMENT A. Approved for public release. Distribution is unlimited. This material is based upon work supported by the United States Air Force under Air Force Contract No. FA8702- 15-D-0001. Any opinions, findings, conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Air Force. © 2019 Massachusetts Institute of Technology. Delivered to the U.S. Government with Unlimited Rights, as defined in DFARS Part 252.227-7013 or 7014 (Feb 2014). Notwithstanding any copyright notice, U.S. Government rights in this work are defined by DFARS 252.227- 7013 or DFARS 252.227-7014 as detailed above. Use of this work other than as specifically authorized by the U.S. Government may violate any copyrights that exist in this work. 1 Preface Preface The Director’s Office at MIT Lincoln Laboratory (MIT LL) requested a comprehensive study on artificial intelligence (AI) focusing on present applications and future science and technology (S&T) opportunities in the Cyber Security and Information Sciences Division (Division 5). This report elaborates on the main results from the study. Since the AI field is evolving so rapidly, the study scope was to look at the recent past and ongoing developments to lead to a set of findings and recommendations. It was important to begin with a short AI history and a lay-of-the-land on representative developments across the Department of Defense (DoD), intelligence communities (IC), and Homeland Security. These areas are addressed in more detail within the report. A main deliverable from the study was to formulate an end-to-end AI canonical architecture that was suitable for a range of applications. The AI canonical architecture, formulated in the study, serves as the guiding framework for all the sections in this report. Even though the study primarily focused on cyber security and information sciences, the enabling technologies are broadly applicable to many other areas. Therefore, we dedicate a full section on enabling technologies in Section 3. The discussion on enabling technologies helps the reader clarify the distinction among AI, machine learning algorithms, and specific techniques to make an end-to-end AI system viable. In order to understand what is the lay-of-the-land in AI, study participants performed a fairly wide reach within MIT LL and external to the Laboratory (government, commercial companies, defense industrial base, peers, academia, and AI centers). In addition to the study participants (shown in the next section under acknowledgements), we also assembled an internal review team (IRT). The IRT was extremely helpful in providing feedback and in helping with the formulation of the study briefings, as we transitioned from data- gathering mode to the study synthesis. The format followed throughout the study was to highlight relevant content that substantiates the study findings, and identify a set of recommendations. 2 Preface An important finding is the significant AI investment by the so-called “big 6” commercial companies. These major commercial companies are Google, Amazon, Facebook, Microsoft, Apple, and IBM. They dominate in the AI ecosystem research and development (R&D) investments within the U.S. According to a recent McKinsey Global Institute report, cumulative R&D investment in AI amounts to about $30 billion per year1. This amount is substantially higher than the R&D investment within the DoD, IC, and Homeland Security. Therefore, the DoD will need to be very strategic about investing where needed, while at the same time leveraging the technologies already developed and available from a wide range of commercial applications. As we will discuss in Section 1 as part of the AI history, MIT LL has been instrumental in developing advanced AI capabilities. For example, MIT LL has a long history in the development of human language technologies (HLT) by successfully applying machine learning algorithms to difficult problems in speech recognition, machine translation, and speech understanding. Section 4 elaborates on prior applications of these technologies, as well as newer applications in the context of multi-modalities (e.g., speech, text, images, and video). An end-to- end AI system is very well suited to enhancing the capabilities of human language analysis. Section 5 discusses AI’s nascent role in cyber security. There have been cases where AI has already provided important benefits. However, much more research is needed in both the application of AI to cyber security and the associated vulnerability to the so-called adversarial AI. Adversarial AI is an area very critical to the DoD, IC, and Homeland Security, where malicious adversaries can disrupt AI systems and make them untrusted in operational environments. This report concludes with specific recommendations by formulating the way forward for Division 5 and a discussion of S&T challenges and opportunities. The S&T challenges and opportunities are centered on the key elements of the AI canonical architecture to strengthen the AI capabilities across the DoD, IC, and Homeland Security in support of national security. 1 McKinsey Global Institute, AI The Next Digital Frontier?, June 2017 3 Acknowledgements Acknowledgements The study participants were selected from across different groups within MIT LL’s Division 5. One criterion was that they needed to be practicing researchers in the AI field. This requirement was important for the study to quickly gather inputs inside Division 5 and outside MIT LL, and then formulate a set of important findings. The study participants, as researchers, had a good understanding of the key players in the AI discipline outside of MIT LL. The AI study participants are shown here and spanned expertise in AI applied to HLT and cyber security. The MIT LL review team was chosen from researchers outside Division 5. Dr. Chris Roeser and Dr. Kosti Hennighausen came into the study with a strong background in red teaming critical technologies for national security. Dr. Sanjeev Mohindra has been working on the AI application to the intelligence, surveillance, and reconnaissance (ISR) area. Dr. Jason Thorton has shown successful use of AI in support of homeland defense. Mr. Bob Hall, from the MIT LL Knowledge Services department, was responsible for searching AI literature, notable events, and relevant announcements. He diligently issued a weekly digest containing this information and maintained an archive of all previous literature findings. An example of this digest, which continues today, is provided in Appendix A. MIT LL’s Archives team, also from the Knowledge Services Department, provided a vast number of records with information on the early history of AI at MIT LL. 4 Acknowledgements The study co-leads are also very thankful to the MIT LL Director’s Office for requesting this comprehensive study and their support during the course of the study. We are also thankful to all the study participants for contributing to the successful completion of the study. We are very thankful to the support personnel including Mr. Brad Dillman, Division 5 graphics artist, and Ms. Cynthia Devlin-Brooks and Ms. Kimberly Pitko for their administrative support. Finally, we are also very thankful to the Technical Communications department at MIT Lincoln Laboratory for the dedicated editorial support. 5 Contents Table of Contents Preface ................................................................................................................................... 2 Acknowledgements ................................................................................................................ 4 Artificial Intelligence Study Motivation (D. Martinez) ............................................................. 8 1 History of Artificial Intelligence and Trends (D. Martinez) ............................................... 13 1.1 Notable Events in AI During the Last Seven Decades .................................................................. 13 1.2 AI Global Trends .......................................................................................................................... 18 2 Lay-of-the-Land (D. Martinez) ......................................................................................... 23 2.1 Study Outreach ........................................................................................................................... 23 2.2 AI Canonical Architecture ............................................................................................................ 26 2.3 High-Level Description of Subsystem Components in the AI Canonical Architecture ................. 29 3 Enabling Technologies (V. Gadepally) ............................................................................. 35 3.2 Data Conditioning ....................................................................................................................... 38 3.3 Algorithms ..................................................................................................................................
Recommended publications
  • Artificial Intelligence in Health Care: the Hope, the Hype, the Promise, the Peril
    Artificial Intelligence in Health Care: The Hope, the Hype, the Promise, the Peril Michael Matheny, Sonoo Thadaney Israni, Mahnoor Ahmed, and Danielle Whicher, Editors WASHINGTON, DC NAM.EDU PREPUBLICATION COPY - Uncorrected Proofs NATIONAL ACADEMY OF MEDICINE • 500 Fifth Street, NW • WASHINGTON, DC 20001 NOTICE: This publication has undergone peer review according to procedures established by the National Academy of Medicine (NAM). Publication by the NAM worthy of public attention, but does not constitute endorsement of conclusions and recommendationssignifies that it is the by productthe NAM. of The a carefully views presented considered in processthis publication and is a contributionare those of individual contributors and do not represent formal consensus positions of the authors’ organizations; the NAM; or the National Academies of Sciences, Engineering, and Medicine. Library of Congress Cataloging-in-Publication Data to Come Copyright 2019 by the National Academy of Sciences. All rights reserved. Printed in the United States of America. Suggested citation: Matheny, M., S. Thadaney Israni, M. Ahmed, and D. Whicher, Editors. 2019. Artificial Intelligence in Health Care: The Hope, the Hype, the Promise, the Peril. NAM Special Publication. Washington, DC: National Academy of Medicine. PREPUBLICATION COPY - Uncorrected Proofs “Knowing is not enough; we must apply. Willing is not enough; we must do.” --GOETHE PREPUBLICATION COPY - Uncorrected Proofs ABOUT THE NATIONAL ACADEMY OF MEDICINE The National Academy of Medicine is one of three Academies constituting the Nation- al Academies of Sciences, Engineering, and Medicine (the National Academies). The Na- tional Academies provide independent, objective analysis and advice to the nation and conduct other activities to solve complex problems and inform public policy decisions.
    [Show full text]
  • SOCIAL MEDIA MINING Introduction Dear Instructors/Users of These Slides
    SOCIAL MEDIA MINING Introduction Dear instructors/users of these slides: Please feel free to include these slides in your own material, or modify them as you see fit. If you decide to incorporate these slides into your presentations, please include the following note: R. Zafarani, M. A. Abbasi, and H. Liu, Social Media Mining: An Introduction, Cambridge University Press, 2014. Free book and slides at http://socialmediamining.info/ or include a link to the website: http://socialmediamining.info/ Social Media Mining http://socialmediamining.info/ MeasuresIntroduction and Metrics 22 Facebook • How does Facebook use your data? Social Media Mining http://socialmediamining.info/ MeasuresIntroduction and Metrics 33 What about Amazon? Social Media Mining http://socialmediamining.info/ MeasuresIntroduction and Metrics 44 Or Twitter? Social Media Mining http://socialmediamining.info/ MeasuresIntroduction and Metrics 55 Objectives of Our Course • Understand social aspects of the Web – Social Theories + Social media + Mining – Learn to collect, clean, and represent social media data – How to measure important properties of social media and simulate social media models – Find and analyze communities in social media – Understand how information propagates in social media – Understanding friendships in social media, perform recommendations, and analyze behavior • Study or ask interesting research issues – e.g., start-up ideas / research challenges • Learn representative algorithms and tools Social Media Mining http://socialmediamining.info/ MeasuresIntroduction and Metrics 66 Social Media Social Media Mining http://socialmediamining.info/ MeasuresIntroduction and Metrics 77 Definition Social Media is the use of electronic and Internet tools for the purpose of sharing and discussing information and experiences with other human beings in more efficient ways.
    [Show full text]
  • A Conceptual Framework for the Mining and Analysis of the Social Media Data 1
    International Journal of Database Theory and Application Vol. 10, No.10 (2017), pp. 11-34 hhtp://dx.doi.org/10.14257/ijdta.2017.10.10.02 A Conceptual Framework for the Mining and Analysis of the Social Media Data 1 Sethunya R Joseph1*, Keletso Letsholo2 and Hlomani Hlomani3 1,2,3 Computer Science Department, Botswana International University of Science and Technology, Palapye, Botswana [email protected], [email protected] [email protected] Abstract Social media data possess the characteristics of Big Data such as volume, veracity, velocity, variability and value. These characteristics make its analysis a bit more challenging than conventional data. Manual analysis approaches are unable to cope with the fast pace at which data is being generated. Processing data manually is also time consuming and requires a lot of effort as compared to using computational methods. However, computational analysis methods usually cannot capture in-depth meanings (semantics) within data. On their individual capacity, each approach is insufficient. As a solution, we propose a Conceptual Framework, which integrates both the traditional approaches and computational approaches to the mining and analysis of social media data. This allows us to leverage the strengths of traditional content analysis, with its regular meticulousness and relative understanding, whilst exploiting the extensive capacity of Big Data analytics and accuracy of computational methods. The proposed Conceptual Framework was evaluated in two stages using an example case of the political landscape of Botswana data collected from Facebook and Twitter platforms. Firstly, a user study was carried through the Inductive Content Analysis (ICA) process using the collected data.
    [Show full text]
  • A Social Media Mining and Ensemble Learning Model: Application to Luxury and Fast Fashion Brands
    information Article A Social Media Mining and Ensemble Learning Model: Application to Luxury and Fast Fashion Brands Yulin Chen Department of Mass Communication, Tamkang University, New Taipei City 25137, Taiwan; [email protected] Abstract: This research proposes a framework for the fashion brand community to explore public participation behaviors triggered by brand information and to understand the importance of key image cues and brand positioning. In addition, it reviews different participation responses (likes, comments, and shares) to build systematic image and theme modules that detail planning require- ments for community information. The sample includes luxury fashion brands (Chanel, Hermès, and Louis Vuitton) and fast fashion brands (Adidas, Nike, and Zara). Using a web crawler, a total of 21,670 posts made from 2011 to 2019 are obtained. A fashion brand image model is constructed to determine key image cues in posts by each brand. Drawing on the findings of the ensemble analysis, this research divides cues used by the six major fashion brands into two modules, image cue module and image and theme cue module, to understand participation responses in the form of likes, comments, and shares. The results of the systematic image and theme module serve as a critical reference for admins exploring the characteristics of public participation for each brand and the main factors motivating public participation. Keywords: fashion brands; luxury brands; masstige; key image cues; social media mining; ensem- ble earning Citation: Chen, Y. A Social Media Mining and Ensemble Learning Model: Application to Luxury and Fast Fashion Brands. Information 2021, 1. Introduction 12, 149.
    [Show full text]
  • Data Mining Techniques for Social Media Analysis
    Advances in Engineering Research (AER), volume 142 International Conference for Phoenixes on Emerging Current Trends in Engineering and Management (PECTEAM 2018) A Survey: Data Mining Techniques for Social Media Analysis 1Elangovan D, 2Dr.Subedha V, 3Sathishkumar R, 4 Ambeth kumar V D 1Research scholar, Department of Computer Science Engineering, Sathyabama University, India 2Professor, Department of Computer Science Engineering, Panimalar Institute of Technology, Chennai, India 3Assistant Professor, 4Associate Professor, Department of Computer Science Engineering, Panimalar Engineering College, Chennai, India [email protected],[email protected], [email protected],[email protected] Abstract—Data mining is the extraction of present information databases. The overall objective of the data mining technique from high volume of data sets, it’s a modern technology. The is to extract information from a huge data set and transform it main intention of the mining is to extract the information from a into a comprehensible structure for more use. The different large no of data set and convert it into a reasonable structure for data Mining techniques are further use. The social media websites like Facebook, twitter, instagram enclosed the billions of unrefined raw data. The I. Characterization. various techniques in data mining process after analyzing the II. Classification. raw data, new information can be obtained. Since this data is III. Regression. active and unstructured, conventional data mining techniques IV. Association. may not be suitable. This survey paper mainly focuses on various V. Clustering. data mining techniques used and challenges that arise while using VI. Change Detection. it. The survey of various work done in the field of social network analysis mainly focuses on future trends in research.
    [Show full text]
  • NIST Data Science Symposium Proceedings
    March 4-5 Data Science Symposium Proceedings 2014 Abstracts for posters presented at the 2014 NIST Data Science Symposium on March 4th 2014 Version 1.1 TABLE OF CONTENTS A CONCEPTUAL FRAMEWORK FOR HEALTH DATA HARMONIZATION .................................................................... 6 LEWIS E. BERMAN, & YAIR G. RAJWAN, ............................................................................................................................. 6 ICF International & Visual Science Informatics ...................................................................................................... 6 REAL-TIME ANALYTICS FOR DATA SCIENCE ............................................................................................................ 7 HIROTAKA OGAWA ......................................................................................................................................................... 7 National Institute of Advance Industrial Science and Technology, JAPAN ............................................................. 7 UTILIZATION OF A VISUAL ANALYTICAL APPROACH TO DETECT ANOMALIES IN LARGE NETWORK TRAFFIC DATA . 7 LASSINE CHERIF, SOO-YEON JI, DONG HYUN JEONG .............................................................................................................. 7 Department of Computer Science and Information Technology, Univ. of the District of Columbia and Dept. of Computer Science, Bowie State University ...........................................................................................................
    [Show full text]
  • Advanced Imaging Technology
    MICROELECTRONICS LABORATORY SPOTLIGHT ON Advanced Imaging Technology KEY FEATURES • World’s lowest readout noise, Digital focal plane array. highest quantum efficiency CCD imagers MIT Lincoln Laboratory has long been a leader • Geiger-mode (GM) APDs with in advanced imaging for defense and scientific single-photon sensitivity and applications. Our imaging capabilities are broadly noiseless digital readout classified into three categories: charge-coupled • DFPAs containing a complete devices (CCDs), avalanche photodiodes (APDs), analog-to-digital converter in every pixel, enabling image and digital focal plane array (DFPA) technology. processing on the focal plane Technology in Support of National Security www.ll.mit.edu SPOTLIGHT ON Advanced Imaging Technology Charge-Coupled Devices Our CCDs are used in ground, air, and spaced-based applications of interest to the government and scientific research community. These CCDs span a range of wavelengths including visible, near infrared, ultraviolet, and soft X-ray. Among imagers employing our CCDs are the two 1.4-billion- pixel Panoramic Survey Telescope and Rapid Response System’s (Pan-STARRS) focal plane arrays, the largest focal planes fabricated to date, and the Space Surveillance Telescope’s curved focal planes that provide a uniform and wide field of view. Optical micrograph of back-illuminated CCD wafer. Geiger-Mode Avalanche Photodiodes For passive imaging, the noiseless readout of our GM-APDs enables photon counting, providing both the requisite sensitivity for low-light applications and photon count rates for high-speed imaging. APDs are also employed in active ladar systems to time-stamp photon arrival times, enabling 3D imaging in compact airborne systems. We also fabricate APD arrays on compound semiconductor materials, expanding these capabilities further into the infrared.
    [Show full text]
  • Integration of System for Research in Health with Computation in Cloud Using Artificial Intelligence
    MOJ Proteomics & Bioinformatics Research Article Open Access Integration of system for research in health with computation in cloud using artificial intelligence Abstract Volume 7 Issue 4 - 2018 Currently the use of information technology is often applied in the health area. With regard 1 to scientific research, we have the SINPE© Integrated System of Electronic Protocols. Carlos Henrique Kuretzki, José Simão de 2 3 The purpose of this tool is to support the researcher in this area who until now did not Paula Pinto, José Claudio Vianna have statistical tests. The main objective of this work is to provide SINPE© users with the 1Professor of the Program for Analysis and Development of improvement in health data analysis through the use of cognitive computing technologies. Systems and Computer Engineering, Federal University, Brazil 2Professor of the Information Management Program, Federal Keywords: artificial intelligence, cloud computing, information systems University, Brazil 3Professor of the Computer Engineering, Universidade Positivo, Brazil Correspondence: Carlos Henrique Kuretzki, Professor of the Program for Analysis and Development of Systems and Computer Engineering, Federal University, Brazil, Email [email protected] Received: June 29, 2018 | Published: August 08, 2018 Introduction more quickly.4 IBM Watson is a cognitive computing technology and have been used to investigate the biological and health sciences. The health sector is one of the largest in most countries and can It is based on medical literature, patents, genetic, and chemical and significantly benefit from high‒quality, real‒time and location‒ pharmacological data.5 The IBM’s Watson platform combines some independent data. However, many healthcare professionals are capabilities, building a complete cognitive system, which is being not familiar with information technology solutions, business and called the new era of computing.
    [Show full text]
  • Classmate Biographies
    CLASSMATE BIOGRAPHIES 38 David Jeffrey Abeshouse Course: VIII Tell us about your recollections of your student years at MIT: I lived in Student House, which is essentially on the B.U. campus. If I recall correctly, it was a mile walk to MIT. That walk, in all kinds of weather, is one of my strongest, if not favorable, memories of my years there. Unless something unusual happened, I made the round trip just once a day. Student House is near Kenmore Square and Fenway Park. The gates to Fenway would open in the sixth inning then, and there were mostly afternoon games, so we would go up to the park occasionally to see, for free, the last three innings. We saw Ted Williams regularly. Student House was also next to the Charles, and it was fun to go down near the river in pleasant weather. I struggled to survive academically, but I did it. I don't remember the name of the professor who lectured our freshman chemistry course, but he spoke in a monotone, and I fell asleep practically every time. I finally went to a different lecture section. I have a poor sense of direction and was regularly lost around the campus and often rushing to get to class. Once in my sophomore year I was rushing and rounded a corner and almost flattened Norbert Wiener. He had a large abdomen, and, from my point of view, the collision was soft. The work on my senior paper was done in building 20. That was a fine place to spend a lot of time.
    [Show full text]
  • MIT Lincoln Laboratory Division and Group Descriptions
    MIT Lincoln Laboratory Division and Group Descriptions October 2012 AIR AND MISSILE DEFENSE TECHNOLOGY DIVISION 3 The Air and Missile Defense Technology Division’s role is to work with government, industry, and laboratories to develop an integrated air and missile defense system. The division’s main focus is investigating system concepts, developing technology, building prototypes, and conducting measurements to support the development of radar and optical sensors, interceptors, and networks for air and missile defense systems. A strong emphasis is placed on partnerships and the transfer of technology to industry. Group 31—Systems and Architectures The Systems and Architectures Group examines near- and long-term technology opportunities for charting the future development of U.S. air and missile defenses. As the country proceeds with the deployment of new missile defense systems, Lincoln Laboratory and this group are working on the next generation of architectures and technologies. The group investigates advanced radar concepts, new infrared sensors, missile designs, space-based platforms, and future distributed command-and-control software to help identify opportunities to develop, test, and deploy these technologies. The group also devotes considerable effort to investigating the impact of various countermeasures on U.S. air and missile defense systems, particularly with respect to various types of electronic warfare. Staff members in the group have a wide variety of backgrounds, including physics, electrical engineering, mathematics, and astrodynamics. Group 33—Advanced Sensor Systems and Test Beds The Advanced Sensor Systems and Test Beds Group supports the Department of Defense by designing and developing modern sensor systems and components to support airborne air defense radars as well as the ballistic missile defense system.
    [Show full text]
  • 2-Page-Tree-Saving Format
    M P Corp. SS&C Conf. .O. Box 8236 Box .O. onterey, CA 93943 CA onterey, FORTY-SIXTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS November 4–7, 2012 Asilomar Hotel and Conference Grounds Technical Co-sponsor FORTY-SIXTH Welcome from the General Chairman ASILOMAR CONFERENCE ON Prof. Miloš Doroslovački SIGNALS, SYstEMS & COMPUTERS The George Washington University Welcome to this unique conference. Many of us come here from year to year to be exposed to new ideas and to do brainstorming Organized in cooperation with about them in an informal and relaxed way, surrounded by magnificent nature. To cite John Steinbeck, Nobel Prize laureate in literature and local to this part of California: “Ideas are like ATK SPACE SYstEMS rabbits. You get a couple and learn how to handle them, and pretty Monterey, California soon you have a dozen.” I am sure that the conference will be stimulating for your future professional endeavors. and Technical Co-sponsor The biggest credit for the intellectual value of the conference goes to the Technical Program Chair Erik G. Larsson and his team, made of Technical Area Chairs and Session Chairs, as well as to IEEE SIGNAL PROCESSING SOCIETY all of you who contributed with papers. Erik and his team prepared an excellent program of 435 papers, including 171 invited, and a tutorial session. For their outstanding work in shaping the technical program, I would like to thank Erik and the Technical Area Chairs: Henk Wymeersch, Gerald Matz, Vincent Poor, Erchin Serpedin, Marius Pesavento, Arye Nehorai, Joseph Cavallaro, Ghassan CONFERENCE COMMITTEE AlRegib and Phil Schniter.
    [Show full text]
  • Data Transfer Options and Requirements
    Data Transfer Options and Requirements Original date 25 Jan 2005 Revision date 21 Aug 2018 Proprietary and Confidential Data Transfer Options and Requirements Summary of changes Date Short description of changes September 2016 Updated name of submission tool to SDSS. August 2018 Rebranded. Contacting support Support is available through the following link: https://www.ibm.com/software/support/watsonhealth/truven_support.html © Copyright IBM Corporation 2018 IBM Confidential 2 Data Transfer Options and Requirements Contents Summary of changes .................................................................................................................................... 2 Contacting support ........................................................................................................................... 2 Contents ........................................................................................................................................................ 3 Overview ....................................................................................................................................................... 5 Electronic data transfer methods ..................................................................................................... 5 Data suppliers ..................................................................................................................... 5 Data recipients ...................................................................................................................
    [Show full text]