Real Dangers of Artificial Intelligence

Every AI advance by the good guys is an advance for the bad guys, too. A new reserach paper, titled “The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation,” calls this the “dual-use” attribute of AI.

This means the technology’s ability to make thousands of complex decisions every second could be used to both help or harm people, depending on the person designing the system.

The experts considered the malicious uses of AI that either currently exists or could be developed over the next five years, and broke them out into three groups: digital, physical, and political.

Here is a selected list of the potential harms discussed:

Digital:

  • Automated phishing, or creating fake emails, websites, and links to steal information.
  • Faster hacking, through the automated discovery of vulnerabilities in software.
  • Fooling AI systems, by taking advantage of the flaws in how AI sees the world.

Physical:

  • Automating terrorism, by using commercial drones or autonomous vehicles as weapons.
  • Robot swarms, enabled by many autonomous robots trying to achieve the same goal.
  • Remote attacks, since autonomous robots wouldn’t need to be controlled within any set distance.

Political

  • Propaganda, through easily-generated fake images and video.
  • Automatic dissent removal, by automatically finding and removing text or images.
  • Personalised persuasion, taking advantage of publicly-available information to target someone’s opinions.

The report paints a bleak picture of our potential future, especially since the timeframe is a mere five years.
But it doesn’t mean we’re resigned to dystopia. Researchers are already working on some potential solutions to these problems, though they warn it will likely be a cat-and-mouse game.

DefenseOne

You Might Also Read: 

AI Will Underpin Cybersecurity:

Combating The Threat Of Malicious AI:

 

« Russia Has Lasers To Shoot Satellites
Bill Gates Says Cryptocurrencies Are Deadly »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Endace

Endace

Endace is a leader in network visibility, network recording and packet capture solutions for security, network and application performance monitoring.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

BaseN

BaseN

BaseN is a full stack IoT Operator. We control the full value chain in order to provide ultimate scalability, fault tolerance and security to our customers.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

SK IT Cyber Security

SK IT Cyber Security

SK IT provide services and solutions for cybersecurity and advanced information system engineering.

Carbide

Carbide

Carbide (formerly Securicy) breaks down enterprise-class security and privacy requirements and makes them accessible to, and achievable by, companies of all sizes.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

Wiser Market

Wiser Market

Wiser Market is a leading company in global online brand protection services, intellectual property protection, anti-Counterfeit & trademark infringements.

Aristi Labs

Aristi Labs

Aristi Labs provides comprehensive security solutions to help businesses protect data and intellectual property, minimizing downtime and maximizing productivity.

Ward Solutions

Ward Solutions

Ward Solutions are an information security consultancy and managed services company. We help organisations protect their brand, people, assets, intellectual property and profits.

Pillar Technology Partners

Pillar Technology Partners

Pillar Technology Partners is an Information Security Company with a focus on improving Cyber Risk and optimizing the processes and technology that underpin the security of your information assets.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.