The Flawed Reality Of Artificial Intelligence

Artificial intelligence (AI) is quite the rage in DC right now.  

Part of it is genuine concern over a still mysterious technology that seems to be moving quickly into various aspects of our lives. No one wants a repeat of the uncontrolled Internet which went from “The Global Public Square” to The Global Public Battlefield.

Part of it, also, is the over hype of techno-bro’s who once again are religious in their belief that all their new tech is the next saving grace of humanity. Of course, the zeal is reinforced by the flipping of said new AI tech company into a few billion bucks.  AI clearly has not changed that most human emotion - greed remains profitable

And the last part is the ignorance of the DC political class when it comes to tech issues - so much for a group of poli sci majors making sense of complex science. To say many are easily taken in by the hype would be kind. 

Fortunately, a few on the Hill, at the Pentagon, and the White House seem to recognize AI is important, but flawed; supplying at least some reality check. 

The Polluted Lake

The AI miracle in our ever expanding information cyber universe is the ability to take large amounts of data and make “sense of it.”  And the software algorithms of AI allowing a speedy racking and stacking this huge amount of information from the cyber space “data lake” are also supposed to learn from each dive into it.  

In my opinion -- Nice ideas.  Flawed concepts.  

Continuing the lake analogy, much depends on where you are dipping into the data lake. This information body is polluted with all kinds of truths, half-truths, and plain lies. 

 And thus, learning also depends on flawed water - easily polluted by a myriad of players with the pollution being a part of the algorithm’s learning - a perpetuity of bad information.

The Plague Of The Spewing Polluter

Supreme among our opponents on the world stage, the Russians love polluting the water to their benefit.  You don’t run a dictatorship for 500 years and not learn to control information.  And they ramped up the skill during the life and death struggle of the Cold War.  Propaganda as power projection.

And in the 21st Century, the Old KGB propaganda fan, Vladimir Putin, and his 24/7 working Cyber space chat bots provide a power in this new domain far beyond any capability Russia has on land, sea, air, and space. A cheap projection of power.   

The Bias Of The Algorithms

Even with care of where you dip into the data lake, remember who is drawing up the algorithms guiding AI.  The vast majority of them are middle to upper middle class males between 25 and 35.  And dare I add overwhelmingly White.  

I am not accuse them of deliberate prejudice.  But I am acknowledging they are going to have a frame of reference for life and experience as we all do.  Theirs is one of that does not necessarily reflect the true demographics and experience of the real world.

We’ve already seen this in AI driven analysis of potential crime and the exaggerated focus on minorities never mind a bias toward the role of women.

Back To Reality

So where does this leave us.  It leaves it as such technology always does -  with another interesting tool to use. But, a tool with fundamental flaws of which we must be careful.

In the final analysis, the best tool for the use and determination of AI sits between our ears.  The human brain too has its biases and challenges.  But, it remains far more adaptable and willing to adapt than any AI so far - and despite the current AI hype, likely to well into the future.

Ronald A. Marks is a former CIA and Capitol Hill staffer and IT Executive.  A member of the Council on Foreign Relations and a Visiting Professor at George Mason University, the Schar School of Policy and Government where he teaches about cyber space and emerging technologies.

Image: anyaberkut

You Might Also Read:

Nowhere To Run:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Private Equity Firms Should Make Cybersecurity Diligence A Priority

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Global Secure Solutions (GSS)

Global Secure Solutions (GSS)

Global Secure Solutions is an IT security and risk consulting firm and authorised ISO training partner for the PECB.

Beyond Security

Beyond Security

Beyond Security is a leader in automated vulnerability assessment and compliance solutions - enabling customers to accurately assess and manage security weaknesses in their networks and applications.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

Smoothwall

Smoothwall

Smoothwall develop intelligent web filtering, Monitoring and security solutions designed to protect users worldwide.

Red Alert Labs

Red Alert Labs

Red Alert Labs is an IoT security provider. We created an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

Beauceron Security

Beauceron Security

Beauceron's cloud-based platform gives employees a powerful personal cyber-risk coach empowering them to improve their cybersecurity practices and behaviours.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

SecureTech360

SecureTech360

SecureTech360 is a cybersecurity and IT consulting firm whose principals have extensive experience in Cybersecurity and Information Technology.

Contechnet Deutschland

Contechnet Deutschland

Contechnet Deutschland started as a specialist in the area of IT disaster recovery and has since broadened its portfolio into information security and data protection.

LANCOM Systems

LANCOM Systems

LANCOM Systems is the leading European manufacturer of secure, reliable and future-proof networking (WAN, LAN, WLAN) and firewall solutions for the public and private sectors.

StarLink

StarLink

StarLink is an acclaimed Value-Added Distributor across the Middle East, Turkey and Africa regions with on-the-ground presence in 20 countries including UK and USA.

SYN Ventures

SYN Ventures

SYN Ventures invests in disruptive, transformational solutions that reduce technology risk.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

Tracebit

Tracebit

Tracebit uses decoys to detect and respond to cloud intrusions in minutes.