Top Cyber Spy Warns Against AI

Australia’s top cyber spy says the world needs to think more about risks created by over-reliance on artificial intelligence so that people don’t “sleepwalk” into dependence on machines they don’t actually understand. In a rare public speech, Mike Burgess, Director-General of the Australian Signals Directorate (pictured), also said spy agencies around the world, including his own, were increasingly using artificial intelligence to carry out their covert activities.

“It is right the world embraces artificial intelligence, but we must embrace this with our eyes wide open. We should not sleepwalk into this, where we suddenly find ourselves in the world that is controlled by software and very few people understand how it works,” Mr Burgess told a conference on artificial intelligence hosted by the Australian Strategic Policy Institute.

“How much of our world will be outsourced AI? How much of our brain power and decision-making will we hand over?

“It’s great … for productivity and the economy and society, but with those same great benefits come serious risks that require serious thinking … and I don’t think we’ve done enough of that thinking to date.”

Artificial intelligence, or AI, includes machine learning, data analytics, data mining and automation. The main uses revolve around solving problems by analysing large amounts of data to pick patterns that a human either couldn’t spot or would take much longer to do.

Mr Burgess said he had seen “unsupervised machine learning” operate very effectively. His agency gathers electronic or “signals” intelligence, protects Australian government computers and attacks foreign networks to support military operations or to counter terrorism and serious cyber-crime. It has its own AI specialists, he said.

“ASD will use artificial intelligence to maintain our capability edge, to defend Australia from rogue threats and help advance Australia’s national interests.

“In the spirit of transparency, there wouldn’t be an intelligence agency on this planet that would not be thinking today about how AI could be exploited, ASD included.”

Mr Burgess said artificial intelligence could be used to defend computer networks but also to “find vulnerabilities or find chinks in the armour” of rival networks.

Peter Singer, a world-renowned expert in technology and national security at the United States think tank New America, told the conference that out of the Fortune 500 companies in the US, 244 listed AI as “the core to their future business strategy”. “Besides being a business arms race, it’s a governmental arms race.”

China had declared its ambition to become the world leader in AI by 2030, whereas the US government was leaving progress to the private sector.

Mr Singer said the rapidly growing “Internet of Things”, made up of web-connected devices, would triple in the next five years.
Most countries were woefully underprepared for the consequences, he said.

“The responsibility for security is unclear. There is, at least in the United States and most western nations, no regulation. Even basic liability hasn’t been figured out. 

“Too often the devices lack even basic security features,” he said. “These ranged from “hackable trucks to hackable Barbie toys”.

But he said the politics and legal questions would likely sharpen quickly once cyber-attacks, which in the past have previously tended to revolve around data, would start to affect real-life objects.

Sydney Morning Herald

You Might Also Read:

Australian Spy Data Helps Business Cyber Threats:

 

« Get Ready For ePrivacy Regulation
Big Data Becomes Everyone's Job »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

Trend Micro

Trend Micro

Trend Micro is a leader in hybrid cloud, endpoint, and network security solutions.

Intland Software

Intland Software

Intland offer an integrated Application Lifecycle Management platform that offers all-round Requirements, Development, and Testing & Quality Assurance functionality.

American International Group (AIG)

American International Group (AIG)

AIG, is an American multinational insurance corporation. Commercial services include cyber risk insurance.

QA

QA

QA is a leading IT training provider in the UK with over 1,500 courses covering all areas of IT including Cyber Security.

Codeproof Technologies

Codeproof Technologies

The Codeproof enterprise mobility solution empowers your business to secure, deploy and manage mobile applications and data on smartphones, tablets, IoT devices and more.

Statice

Statice

Statice develops state-of-the-art data privacy technology that helps companies double-down on data-driven innovation while safeguarding the privacy of individuals.

European Healthcare Fraud & Corruption Network (EHFCN)

European Healthcare Fraud & Corruption Network (EHFCN)

EHFCN is the only organisation dedicated to combating fraud, corruption and waste in the healthcare sector across Europe.

Axis Security

Axis Security

Axis Security technologies transform open networks and vulnerable applications into fully protected resources that the business can trust.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Managed IT Services

Managed IT Services

Managed IT Services is a managed IT Services Company offering a diverse range of Cyber Security services and IT solutions.

Cloudsec Asia

Cloudsec Asia

Cloudsec Asia is Thailand's top-ranked cybersecurity consultant company. We offers security services to ensure that all your IT assets are reliable, accessible, and secure.

ClearSky Cyber Security

ClearSky Cyber Security

ClearSky cyber security provides cyber solutions, focused on threat intelligence services, mainly for the financial sector, critical infrastructure, public sector and the pharma sector.

Knowit

Knowit

Knowit support customers in the digital transformation, simplify people’s everyday lives and create secure and innovative solutions enabling a sustainable future.

CyTwist

CyTwist

CyTwist is an early warning attack detection platform that complement your existing security suite and provides your security teams with unique detection capabilities of stealth targeted attacks.

CyRiSo

CyRiSo

CyRiSo is a cyber security consulting company with a focus on 'as-a-service' services for the most pressing challenges of cyber security.