Criminally Exploiting AI Tools To Generate Illicit Revenue From Music Streaming

A US musician has been charged with using Artificial Intelligence (AI) tools and thousands of bots to fraudulently stream songs billions of times, so that he could claim millions of dollars in royalties. 

Michael Smith aged 52, of North Carolina, has been charged with three counts of wire fraud, wire fraud conspiracy and money laundering conspiracy charges. Smith allegedly concealed his actions by using fake names and employing a large network of individuals and technology to evade detection from streaming platforms’ anti-fraud systems.

Smith is alleged to have used hundreds of thousands of AI-generated songs to manipulate music streams. The tracks were streamed billions of times across multiple platforms by thousands of automated bot accounts to avoid detection. Smith claimed more than $10m in royalty payments over the course of the scheme, which spanned several years.

According to the Indictment, Smith was sometimes operating as many as 10,000 active bot accounts to stream his AI-generated tracks. It is alleged that the tracks in question were provided to Smith through a partnership with the chief executive of an unnamed AI music company, dating from  2018. The co-conspirator is said to have supplied him with thousands of tracks a month in exchange for track metadata, such as song and artist names, as well as a monthly cut of streaming revenue.

The wider rise of AI-generated music and the increased availability of free tools to make tracks, have added to concerns for artists and record labels about receiving their correct share of profits made on AI-created tracks.

#Tools that can create text, images, video, audio in response to prompts are underpinned by systems that have been "trained" on vast quantities of data, such as online text and images scraped, often indiscriminately, from across the web. 

Content that actually belongs to other artists, or is protected by copyright, has been collected to form part of some of the training data for such tools. This has generated outrage amongst artists, musicians and actors, who feel their work is being illegally exploited  to generate seemingly original material, without due recognition or reward.

US Dept. of Justice   |   BBC   |    SlashDot   |    Rolling Stone   |    Proactive Investors   |    Yahoo 

Image: Alexander Shatov

You Might Also Read: 

Hollywood Stars Strike Over AI Human Replacements:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Telegram Disables Features Used For Illegal Activity
Social Media, Misinformation & The US Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

Mako Group

Mako Group

The Mako Group specializes in protection - providing security through auditing, testing, and assessments. And, we do it all with the highest quality standards possible.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Mobile Guroo

Mobile Guroo

Mobile Guroo is a strategy and systems integrator for Enterprise Mobility Management projects.

CSA Events

CSA Events

Cloud Security Alliance conducts a series of conferences around the world. This listing provides a link to details of upcoming events.

edgescan

edgescan

edgescan is a cloud-based continuous vulnerability management and penetration testing solution.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

MACH37

MACH37

MACH37 is a market-centric cybersecurity accelerator program designed to facilitate the creation of the next generation of cybersecurity product companies.

Miradore

Miradore

Miradore is a software company specializing in effective, cloud-based device management. Our goal is to help IT Service Providers and IT departments secure and control devices.

BELAC

BELAC

BELAC is the national accreditation body for Belgium.

Visium Technologies

Visium Technologies

Visium Analytics provides innovative data visualization, cybersecurity technologies and solutions to businesses to protect and secure their data assets.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Clario Tech

Clario Tech

Clario is a simple, comprehensive, personalized protection app. It comes with a full suite of intelligent security software and intelligent people to help you live a better, safer digital life.

ServerScan

ServerScan

ServerScan specializes in providing server scanning & compliance services to organizations of all types and sizes.

RKVST

RKVST

RKVST is a powerful tool that builds trust in multi-party processes when it’s critical to have high assurance in data for confident decisions.

Digital Silence

Digital Silence

Digital Silence is a world-class provider of information security research and consulting services.

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.