Prime Minister Sunak Identifies The Risks & Potential Of AI

For the first time, the British Government has published an official policy document on the capabilities and risks arising from the rapid development of Artificial Intelligence (AI), drawing on sources which include intelligence assessments. And AI can make it easier to build chemical and biological weapons, UK Prime Minister Rishi Sunak (pictured) said in a speech at the Royal Institute last week.

The prime minister's speech on the capabilities and potential risks posed by AI included cyber attacks and fraud.  

AI will pose major security risks to the UK within two years and has the potential to “enhance” terrorist capabilities, new analysis by the Sunak government has warned. Sunak emphasised that mitigating the risk of human extinction because of AI should be a global priority alongside pandemics and nuclear war and on the local level “Criminals could exploit AI for cyber attacks, disinformation, fraud or even child sexual abuse,” he said.

Prime Minister Sunak also talked about the establishment of a UK AI Safety Institute which, he said would be a world first and would test new types of AI for a range of risks from generating misinformation to posing an existential threat. Unfortunately, society could lose all control of switiching AI on or off, said Sunak.

His speech aimed to show the UK as a global AI leader and the PM said the technology was already creating UK jobs.

Sunak said among the risks outlined in the report was that AI could be used by terrorist groups "to spread fear and disruption on an even greater scale". He added that development of the technology would increase economic growth and productivity, but it could have a negative impact on the UK labour market. 

Mitigating the risk of human extinction from AI should be a "global priority", he said. But he added: "This is not a risk that people need to be losing sleep over right now and I don't want to be alarmist." He said that he was generally "optimistic" about the potential of AI to transform people's lives for the better. 

According to the British government's Safety and Security Risks of Generative Artificial Intelligence to 2025 Report, AI The risks fall into at least three overlapping domains:-

  • Digital risks are assessed to be the most likely and have the highest impact to 2025. Threats include cybercrime and hacking. Generative AI will also improve digital defences to these threats. 
  • Risks to political systems and societies will increase in likelihood to 2025, becoming as significant as digital risks as generative AI develops and adoption widens. Threats include manipulation and deception of populations. 
  • Physical risks will likely rise as generative AI becomes embedded into more physical systems, including critical infrastructure and the built environment. If implemented without adequate safety and security controls, AI may introduce new risks of failure and vulnerabilities to attack. 

Experts continue to be divided about the threat posed by AI and previous fears about other emerging technologies have so far not materialised.

Gov.UK:   Gov.UK:    Gov.UK:   Gov:UK

BBC:     Guardian:   Independent:    Metro:   iNews:   Herald Scotland:  Impartial Reporter:

You Might Also Read: 

The AI Dilemma: Regulate, Monopolize, Or Liberate:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible



 

« Senior Managers Need Higher Cyber Security Awareness Than Other Employees
Balancing China’s Role In The UK’s AI Agenda »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Titania

Titania

Titania provide network security and compliance software. Find your Network Security gaps before hackers do with our security & compliance tools.

ThaiCERT

ThaiCERT

ThaiCERT is the national Computer Security Incident Response Team (CSIRT) for Thailand.

ZeroFox

ZeroFox

ZeroFox safeguards modern organizations from dynamic security risks across social, mobile, surface, deep and dark web, email and collaboration platforms.

Center for Internet Security (CIS)

Center for Internet Security (CIS)

CIS is a nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

Canadian Security Intelligence Service (CSIS)

Canadian Security Intelligence Service (CSIS)

CSIS collects and analyzes threat-related information concerning the security of Canada in areas including terrorism, espionage, WMD, cybersecurity and critical infrastructure protection.

Quadrant Information Security

Quadrant Information Security

Quadrant Information Security is a consulting firm committed to supporting organizations in all vertical markets and protecting their sensitive data.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

DKBInnovative

DKBInnovative

DKBinnovative is a best-practice driven IT management firm that provides secure, reliable IT solutions to productivity-focused clients around the globe.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

E2E Technologies

E2E Technologies

E2E Technologies are a proactive, SLA-beating, managed service provider that busts the common stereotypes surrounding IT.

Polestar Industrial IT

Polestar Industrial IT

Polestar work on both sides of the IT & OT divide. Network, Data & Asset Security is our priority. Polestar installations are robust and resilient and comply with the appropriate security.

Pistachio

Pistachio

Pistachio is the new evolution of cybersecurity awareness training and attack simulations.

Venticento

Venticento

Venticento is an IT company specialized in consulting and network support and assistance for companies that need to make their business processes more effective.