The Flawed Reality Of Artificial Intelligence

Artificial intelligence (AI) is quite the rage in DC right now.  

Part of it is genuine concern over a still mysterious technology that seems to be moving quickly into various aspects of our lives. No one wants a repeat of the uncontrolled Internet which went from “The Global Public Square” to The Global Public Battlefield.

Part of it, also, is the over hype of techno-bro’s who once again are religious in their belief that all their new tech is the next saving grace of humanity. Of course, the zeal is reinforced by the flipping of said new AI tech company into a few billion bucks.  AI clearly has not changed that most human emotion - greed remains profitable

And the last part is the ignorance of the DC political class when it comes to tech issues - so much for a group of poli sci majors making sense of complex science. To say many are easily taken in by the hype would be kind. 

Fortunately, a few on the Hill, at the Pentagon, and the White House seem to recognize AI is important, but flawed; supplying at least some reality check. 

The Polluted Lake

The AI miracle in our ever expanding information cyber universe is the ability to take large amounts of data and make “sense of it.”  And the software algorithms of AI allowing a speedy racking and stacking this huge amount of information from the cyber space “data lake” are also supposed to learn from each dive into it.  

In my opinion -- Nice ideas.  Flawed concepts.  

Continuing the lake analogy, much depends on where you are dipping into the data lake. This information body is polluted with all kinds of truths, half-truths, and plain lies. 

 And thus, learning also depends on flawed water - easily polluted by a myriad of players with the pollution being a part of the algorithm’s learning - a perpetuity of bad information.

The Plague Of The Spewing Polluter

Supreme among our opponents on the world stage, the Russians love polluting the water to their benefit.  You don’t run a dictatorship for 500 years and not learn to control information.  And they ramped up the skill during the life and death struggle of the Cold War.  Propaganda as power projection.

And in the 21st Century, the Old KGB propaganda fan, Vladimir Putin, and his 24/7 working Cyber space chat bots provide a power in this new domain far beyond any capability Russia has on land, sea, air, and space. A cheap projection of power.   

The Bias Of The Algorithms

Even with care of where you dip into the data lake, remember who is drawing up the algorithms guiding AI.  The vast majority of them are middle to upper middle class males between 25 and 35.  And dare I add overwhelmingly White.  

I am not accuse them of deliberate prejudice.  But I am acknowledging they are going to have a frame of reference for life and experience as we all do.  Theirs is one of that does not necessarily reflect the true demographics and experience of the real world.

We’ve already seen this in AI driven analysis of potential crime and the exaggerated focus on minorities never mind a bias toward the role of women.

Back To Reality

So where does this leave us.  It leaves it as such technology always does -  with another interesting tool to use. But, a tool with fundamental flaws of which we must be careful.

In the final analysis, the best tool for the use and determination of AI sits between our ears.  The human brain too has its biases and challenges.  But, it remains far more adaptable and willing to adapt than any AI so far - and despite the current AI hype, likely to well into the future.

Ronald A. Marks is a former CIA and Capitol Hill staffer and IT Executive.  A member of the Council on Foreign Relations and a Visiting Professor at George Mason University, the Schar School of Policy and Government where he teaches about cyber space and emerging technologies.

Image: anyaberkut

You Might Also Read:

Nowhere To Run:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« The Financial Impact Of Cybercrime
Cybersecurity Education: Preparing the Next Generation of Cyber Defenders  »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Open Networking Foundation (ONF)

Open Networking Foundation (ONF)

The Open Networking Foundation (ONF) is a non-profit operator led consortium driving transformation of network infrastructure and carrier business models.

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

Basis Technology

Basis Technology

Basis Technology provides software solutions for text analytics, information retrieval, digital forensics, and identity resolution.

M2SYS

M2SYS

M2SYS is a worldwide leader in identification and authentication solutions.

Cyber Threat Defense (CT Defense)

Cyber Threat Defense (CT Defense)

CT Defense specialize in penetration testing and security assessments.

BoldCloud

BoldCloud

BoldCloud's award winning Cybersecurity Advisory services and Layered Security approach adds new critical layers of protection for your data and your business.

Digital Identification & Authentication Council of Canada (DIACC)

Digital Identification & Authentication Council of Canada (DIACC)

DIACC is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication.

BullWall

BullWall

BullWall is a digital innovator dedicated to fight cybercrime in its many forms. Our overarching purpose is to stop new and unknown strings of ransomware attacks in its tracks.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

Viettel Cyber Security

Viettel Cyber Security

Viettel Cyber Security is an organization under the Military Telecommunication Industry Group, conducting research and developing information security solutions for domestic and foreign customers.

Arctic Group

Arctic Group

Arctic Group is a Swedish service provider focusing on cybersecurity, integration services and deployment of software development tools.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.

EGUARDIAN

EGUARDIAN

EGUARDIAN serves as a Value-Added Distributor and technology enabler in the APAC region with the aim of further expanding globally and cater to the needs of the demands with the emerging technology.

LT Harper

LT Harper

LT Harper specialise in cyber security recruitment. We believe in providing an individualised service to our customers whether they are looking for a new opportunity or to hire talent.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.