Real Dangers of Artificial Intelligence

Every AI advance by the good guys is an advance for the bad guys, too. A new reserach paper, titled “The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation,” calls this the “dual-use” attribute of AI.

This means the technology’s ability to make thousands of complex decisions every second could be used to both help or harm people, depending on the person designing the system.

The experts considered the malicious uses of AI that either currently exists or could be developed over the next five years, and broke them out into three groups: digital, physical, and political.

Here is a selected list of the potential harms discussed:

Digital:

  • Automated phishing, or creating fake emails, websites, and links to steal information.
  • Faster hacking, through the automated discovery of vulnerabilities in software.
  • Fooling AI systems, by taking advantage of the flaws in how AI sees the world.

Physical:

  • Automating terrorism, by using commercial drones or autonomous vehicles as weapons.
  • Robot swarms, enabled by many autonomous robots trying to achieve the same goal.
  • Remote attacks, since autonomous robots wouldn’t need to be controlled within any set distance.

Political

  • Propaganda, through easily-generated fake images and video.
  • Automatic dissent removal, by automatically finding and removing text or images.
  • Personalised persuasion, taking advantage of publicly-available information to target someone’s opinions.

The report paints a bleak picture of our potential future, especially since the timeframe is a mere five years.
But it doesn’t mean we’re resigned to dystopia. Researchers are already working on some potential solutions to these problems, though they warn it will likely be a cat-and-mouse game.

DefenseOne

You Might Also Read: 

AI Will Underpin Cybersecurity:

Combating The Threat Of Malicious AI:

 

« Russia Has Lasers To Shoot Satellites
Bill Gates Says Cryptocurrencies Are Deadly »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

RPC

RPC

RPC is a business law firm. Practice areas include technology and cyber risk.

Fortify Experts

Fortify Experts

Fortify Experts is a search and recruitment firm specializing in Cyber Security.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

PrimaTech

PrimaTech

PrimaTech provide process safety, cyber and process security, and risk management consulting, training and software for the process industries.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

The Legal 500

The Legal 500

The Legal 500 Hall of Fame highlights, to clients, the law firm partners who are at the pinnacle of the profession. Practice areas covered include Data Protection, Privacy and Cybersecurity.

MOXFIVE

MOXFIVE

MOXFIVE is a specialized technical advisory firm founded to bring clarity to the complexity of cyber attacks.

Mobileum

Mobileum

Mobileum is a leading provider of Telecom analytics for roaming, security and risk management and end-to-end domestic and roaming testing solutions.

IT-Seal

IT-Seal

IT-Seal GmbH specializes in sustainable security culture and awareness training.

NetBlocks

NetBlocks

NetBlocks is a global internet monitor working at the intersection of digital rights, cyber-security and internet governance.

BigBear.ai

BigBear.ai

BigBear.ai delivers high-end analytics capabilities across the data and digital spectrum to deliver information superiority and decision support.

First Focus

First Focus

First Focus is a managed service provider for medium-sized organisations.

Chestnut Hill Technologies (CHT)

Chestnut Hill Technologies (CHT)

CHT provide Best Practices IT Cybersecurity and Technology Solutions and Consulting Support to the Mid Cap through Fortune 1000 Nationwide.

Seiber

Seiber

Seiber are a UK based Cyber Security company who provide consultancy and training services. Our objective is to stop bad things happening to good people.

Harmonia Holdings Group

Harmonia Holdings Group

Harmonia Holdings Group was born in 2006 with the vision to bring innovation and change to the federal IT sector.