NSA Warning: China Is Stealing AI Technology

The US National Security Agency is telling US tech companies to be aware of Chinese attempts to steal their Artificial Intelligence (AI) technology. The Pentagon’s cyber intelligence chief was warning about what China might do with these new tools. “We think much about the ability of what AI is going to do for us in the future. One of the things that we have communicated very clearly to a number of the US companies is the importance of securing the intellectual property that you have invested within this." General Paul Nakasone said. 

“This type of capability because this will be a target of our adversaries,” he told the House Armed Services cyber and intelligence subcommittee recently. The General, who is head of both the NSA and Cyber Command, didn’t mention China by name, but Nakasone says that China is the top nation-state threat to US intellectual property. 

Enormous investments and leading scientists and engineers have been engaged in the rise of new public Large Language Model (LLM) facing AI programs like ChatGPT, which can provide complex, human-like answers to a wide number of prompts. Bots like ChatGPT may not be able to pull off the next big Microsoft server worm or Colonial Pipeline ransomware exploit but they may help criminal gangs and nation-state hackers develop some attacks against IT, according to Rob Joyce, director of the NSA's Cybersecurity Directorate.

These generative pre-trained transformers have proven widely useful for everything from writing research papers, to finding Chinese weather balloons. But many of them achieve their miraculous effects by simply pulling information from the open Internet where some info is not accurate or correct. 

Additionally, as much as 11 percent of the data that employees put into ChatGPT and other new AI engines to get answers is proprietary or confidential, according to analysis from software firm Cyberhaven. 

Intelligence agencies will have to be cautious in employing such models and be certain of the providence of the data that feeds them, Ronald Moultrie, defense undersecretary for intelligence, told the House Committee. “We know our adversaries are considering or already thinking about large data models if you will, and how they may use that against us, he said. “Our...being able to identify when something is actually an AI-generated outcome is something that's gonna be very important to us, too.”

The Chinese government is investing heavily in its national plan to become the world leader in AI by 2030. and the US intelligence establishment needs to become better attuned to how adversaries might use similar AI engines to create disinformation. 

Cyberhaven:    DefenseOne:    CyberCom:    Microsoft:    The Register:    NDU / Richard Andres    @StephSmith

You Might Also Read: 

China Mandates Security Reviews For AI Services Like ChatGPT:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« Ransomware Attack Hits US Shipyard
What The Latest Cybersecurity Trends Mean For Your SME  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BCS, The chartered Institute for IT

BCS, The chartered Institute for IT

BCS provides IT professionals with up to date and relevant certifications enabling them to manage IT security effectively within their budget.

CloudPassage

CloudPassage

CloudPassage, a cloud security and compliance pioneer, safeguards cloud infrastructure for the world’s best-recognized brands.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

Roke Manor Research

Roke Manor Research

Roke is a world-class electronics engineering consultancy. Areas of expertise include cyber security, cyber assurance and cryptographic solutions.

Hedgehog Security

Hedgehog Security

The key objective of Hedgehog is to provide simple, effective and affordable information security improvements that support your drive to increase productivity and profitability.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

Evidence Talks Ltd

Evidence Talks Ltd

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Guardian Data Destruction

Guardian Data Destruction

Guardian Data Destruction provides a comprehensive suite of onsite e-data destruction services.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

CyberNews

CyberNews

Cybernews.com is a research-based online publication that helps people navigate a safe path through their increasingly complex digital lives.

Secure Diversity

Secure Diversity

Secure Diversity is an innovative non-profit organization with leaders that think out of the box to create strategies & solutions to increase diversity in the cybersecurity industry.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

LockMagic

LockMagic

Lockmagic is an information asset management solution to protect, track, audit and control accesses to sensitive information inside and outside your organization.

Kerberus Cyber Security

Kerberus Cyber Security

Kerberus Cyber Security (formerly MintDefense) is a leading innovator in Web3 user security, dedicated to safeguarding digital assets and transactions through its flagship product, Sentinel3.