Criminally Exploiting AI Tools To Generate Illicit Revenue From Music Streaming

A US musician has been charged with using Artificial Intelligence (AI) tools and thousands of bots to fraudulently stream songs billions of times, so that he could claim millions of dollars in royalties. 

Michael Smith aged 52, of North Carolina, has been charged with three counts of wire fraud, wire fraud conspiracy and money laundering conspiracy charges. Smith allegedly concealed his actions by using fake names and employing a large network of individuals and technology to evade detection from streaming platforms’ anti-fraud systems.

Smith is alleged to have used hundreds of thousands of AI-generated songs to manipulate music streams. The tracks were streamed billions of times across multiple platforms by thousands of automated bot accounts to avoid detection. Smith claimed more than $10m in royalty payments over the course of the scheme, which spanned several years.

According to the Indictment, Smith was sometimes operating as many as 10,000 active bot accounts to stream his AI-generated tracks. It is alleged that the tracks in question were provided to Smith through a partnership with the chief executive of an unnamed AI music company, dating from  2018. The co-conspirator is said to have supplied him with thousands of tracks a month in exchange for track metadata, such as song and artist names, as well as a monthly cut of streaming revenue.

The wider rise of AI-generated music and the increased availability of free tools to make tracks, have added to concerns for artists and record labels about receiving their correct share of profits made on AI-created tracks.

#Tools that can create text, images, video, audio in response to prompts are underpinned by systems that have been "trained" on vast quantities of data, such as online text and images scraped, often indiscriminately, from across the web. 

Content that actually belongs to other artists, or is protected by copyright, has been collected to form part of some of the training data for such tools. This has generated outrage amongst artists, musicians and actors, who feel their work is being illegally exploited  to generate seemingly original material, without due recognition or reward.

US Dept. of Justice   |   BBC   |    SlashDot   |    Rolling Stone   |    Proactive Investors   |    Yahoo 

Image: Alexander Shatov

You Might Also Read: 

Hollywood Stars Strike Over AI Human Replacements:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Telegram Disables Features Used For Illegal Activity
Social Media, Misinformation & The US Elections »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Technology Institute - De Montfort University

Cyber Technology Institute - De Montfort University

The Cyber Technology Institute provides training and high quality research and consultancy services in the fields of cyber security, software engineering and digital forensics.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

ICS2

ICS2

ICS² is the first cyber security company focusing on protecting the control system of power, oil, gas, and petrochemicals plants.

Jscrambler

Jscrambler

Jscrambler addresses all your JavaScript and Web application protection needs.

Threat Intelligence

Threat Intelligence

Threat Intelligence is a specialist security company providing penetration testing, threat intelligence, incident response and training services.

Secure Soft

Secure Soft

Secure Soft are experts in Computer and Information Security with a presence in Peru, Colombia and Ecuador.

Vesta

Vesta

Vesta Corporation is a global provider of a scalable suite of fraud and payment solutions for online commerce.

CyberInsureOne

CyberInsureOne

At CyberInsureOne, we break down the complex world of cyber insurance, and connect you with providers that can give you and your company peace of mind.

Defendify

Defendify

We built Defendify to help small businesses navigate the cybersecurity landscape with cybersecurity that is dead simple, affordable, and works around the clock.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

Purple Team

Purple Team

Purple Team is an expert cybersecurity and managed security service provider focused on arming your IT infrastructure with both red team and blue team services.

Keytos

Keytos

Keytos has revolutionized the Identity Management and PKI industry by creating cryptographic tools that allow you to go password-less by making security transparent to the user.

Nuke From Orbit

Nuke From Orbit

Nuke's mission is to put you back in control of your digital identity when your smartphone gets stolen.

Sage IT

Sage IT

Sage IT offer a wide range of professional and consulting services to help organizations overcome the challenges of today's ever-changing business environment.