{"id":5360,"date":"2025-10-14T11:11:32","date_gmt":"2025-10-14T11:11:32","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=5360"},"modified":"2025-10-14T11:11:32","modified_gmt":"2025-10-14T11:11:32","slug":"neuroscientists-sue-apple-over-alleged-use-of-pirated-books-to-train-ai-models","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=5360","title":{"rendered":"Neuroscientists Sue Apple over Alleged Use of Pirated Books to Train AI Models"},"content":{"rendered":"<p>Apple faces more allegations as two U.S. neuroscientists have filed a federal lawsuit accusing the company of violating copyright laws.<\/p>\n<p>The two professors from the State University of New York claim that Apple is using pirated materials and copies of e-books sold through its own Books app to train its artificial intelligence tool, Apple Intelligence.<\/p>\n<p>According to <a href=\"https:\/\/news.bloomberglaw.com\/privacy-and-data-security\/apple-accused-of-ai-copyright-infringement-by-suny-professors\" target=\"_blank\" rel=\"noopener\">Bloomberg<\/a>, Apple\u2019s OpenELM model, one of several comprising Apple Intelligence, was trained on datasets including a pirated database called Books3 that contains the professors\u2019 works, Susana Martinez-Conde and Stephen L. Macknik.<\/p>\n<h2>Apple\u2019s AI dreams<\/h2>\n<p>These lawsuits call out a core contradiction in Apple\u2019s AI story. Publicly, Apple emphasizes privacy-preserving techniques and licensed content. The allegations sketch a different picture behind closed doors.<\/p>\n<p>Apple says its models rely on \u201cpublicly available and open-source data\u201d totaling 1.8 trillion tokens. Copyright attorneys counter that \u201cpublicly available\u201d does not equal \u201clegally usable,\u201d especially when shadow libraries are involved.<\/p>\n<p>The market is already moving toward cleaner data. Companies like Shutterstock report substantial revenue from licensing digital assets to AI developers, a reminder that legitimately acquired training data has real value.<\/p>\n<p>Courts are drawing lines. Training on legitimately obtained content may be fair use, but using pirated materials crosses legal boundaries. If that standard sticks, Apple could be forced to rebuild its AI stack using only licensed content.<\/p>\n<p>Zoom out and the implications get bigger. Legal and legislative developments aim to create AI-specific intellectual property frameworks that balance innovation with creator rights, possibly requiring safeguards similar to YouTube\u2019s Content ID system. Painful in the short term, maybe, but inevitable.<\/p>\n<h2>Waiting for the verdict<\/h2>\n<p>Apple\u2019s legal fight is more than corporate drama, it is a test case for intellectual property in the AI era. How Apple responds will shape how the rest of tech acquires training data.<\/p>\n<p>The complaints seek unspecified monetary damages and court orders to stop further copyright violations. With last month\u2019s <a href=\"https:\/\/www.eweek.com\/news\/anthropic-settlement-copyright-case\/\" target=\"_blank\" rel=\"noopener\">$1.5 billion Anthropic settlement<\/a> on the board and alleged infringement touching nearly 200,000 works, the financial exposure is enormous.<\/p>\n<p><strong>It was a similar story last month, as <a href=\"https:\/\/www.eweek.com\/news\/books3-apple-ai-lawsuit\/\" target=\"_blank\" rel=\"noopener\">two authors alleged<\/a> Apple trained its AI system on pirated books.<\/strong><\/p>\n<p>The post <a href=\"https:\/\/www.eweek.com\/news\/apple-copyright-allegations\/\">Neuroscientists Sue Apple over Alleged Use of Pirated Books to Train AI Models<\/a> appeared first on <a href=\"https:\/\/www.eweek.com\/\">eWEEK<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Apple faces more allegations as two U.S. neuroscientists have filed a federal lawsuit accusing the company of violating copyright laws. The two professors from the State University of New York claim that Apple is using pirated materials and copies of e-books sold through its own Books app to train its artificial intelligence tool, Apple Intelligence. [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-5360","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5360"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5360"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5360\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}