Real Dangers of Artificial Intelligence

Every AI advance by the good guys is an advance for the bad guys, too. A new reserach paper, titled “The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation,” calls this the “dual-use” attribute of AI.

This means the technology’s ability to make thousands of complex decisions every second could be used to both help or harm people, depending on the person designing the system.

The experts considered the malicious uses of AI that either currently exists or could be developed over the next five years, and broke them out into three groups: digital, physical, and political.

Here is a selected list of the potential harms discussed:

Digital:

  • Automated phishing, or creating fake emails, websites, and links to steal information.
  • Faster hacking, through the automated discovery of vulnerabilities in software.
  • Fooling AI systems, by taking advantage of the flaws in how AI sees the world.

Physical:

  • Automating terrorism, by using commercial drones or autonomous vehicles as weapons.
  • Robot swarms, enabled by many autonomous robots trying to achieve the same goal.
  • Remote attacks, since autonomous robots wouldn’t need to be controlled within any set distance.

Political

  • Propaganda, through easily-generated fake images and video.
  • Automatic dissent removal, by automatically finding and removing text or images.
  • Personalised persuasion, taking advantage of publicly-available information to target someone’s opinions.

The report paints a bleak picture of our potential future, especially since the timeframe is a mere five years.
But it doesn’t mean we’re resigned to dystopia. Researchers are already working on some potential solutions to these problems, though they warn it will likely be a cat-and-mouse game.

DefenseOne

You Might Also Read: 

AI Will Underpin Cybersecurity:

Combating The Threat Of Malicious AI:

 

« Russia Has Lasers To Shoot Satellites
Bill Gates Says Cryptocurrencies Are Deadly »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Exodus Intelligence

Exodus Intelligence

Exodus Intelligence are an industry leading provider of exclusive zero-day vulnerability intelligence, exploits, defensive guidance, and vulnerability research trends.

Vector InfoTech

Vector InfoTech

Vector InfoTech is a leader in Industrial Security, Networks, IT and Telecommunications.

Transpere

Transpere

Transpere provides IT Asset Disposition (ITAD), Data Destruction, Electronic Recycling and Onsite Data Services.

Vanbreda

Vanbreda

Vanbreda Risk & Benefits is the largest independent insurance broker and risk consultant in Belgium and the leading insurance partner in the Benelux.

Hut Six Security

Hut Six Security

Train, test and track your Information Security culture through information security awareness training and customised phishing simulation campaigns.

Russell Reynolds Associates

Russell Reynolds Associates

Russell Reynolds Associates is a global leadership advisory and search firm with functional expertise in Digital Leadership, Data & Analytics, and Compliance.

Swiss It Security Group

Swiss It Security Group

Swiss It Security Group offers clients complete IT security concepts based on innovative solutions and technology, with a focus on protection, detection and defence.

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

Center for Medical Device Cybersecurity (CMDC) - University of Minnesota

CMDC’s mission is to foster university-industry-government partnerships to assure that medical devices are safe and secure from cybersecurity threats.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

Entara

Entara

Entara (formerly YJT Solutions) is an eXtended Service Provider (XSP) focused on providing cutting edge technology and cyber security solutions to companies in regulated industries.

SpiderOak

SpiderOak

SpiderOak's portfolio of Secure Communication & Collaboration products ensure the confidentiality, integrity, and availability of your most sensitive data in any environment.

Prembly

Prembly

Prembly are a compliance and security infrastructure company.

Zeus Cloud

Zeus Cloud

Zeus Cloud provide clients with world-class web hosting services to businesses both big and small.

Access Talent Today

Access Talent Today

Access Talent Today is an AI/ML and cyber security talent provider.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.