Top Cyber Spy Warns Against AI

Australia’s top cyber spy says the world needs to think more about risks created by over-reliance on artificial intelligence so that people don’t “sleepwalk” into dependence on machines they don’t actually understand. In a rare public speech, Mike Burgess, Director-General of the Australian Signals Directorate (pictured), also said spy agencies around the world, including his own, were increasingly using artificial intelligence to carry out their covert activities.

“It is right the world embraces artificial intelligence, but we must embrace this with our eyes wide open. We should not sleepwalk into this, where we suddenly find ourselves in the world that is controlled by software and very few people understand how it works,” Mr Burgess told a conference on artificial intelligence hosted by the Australian Strategic Policy Institute.

“How much of our world will be outsourced AI? How much of our brain power and decision-making will we hand over?

“It’s great … for productivity and the economy and society, but with those same great benefits come serious risks that require serious thinking … and I don’t think we’ve done enough of that thinking to date.”

Artificial intelligence, or AI, includes machine learning, data analytics, data mining and automation. The main uses revolve around solving problems by analysing large amounts of data to pick patterns that a human either couldn’t spot or would take much longer to do.

Mr Burgess said he had seen “unsupervised machine learning” operate very effectively. His agency gathers electronic or “signals” intelligence, protects Australian government computers and attacks foreign networks to support military operations or to counter terrorism and serious cyber-crime. It has its own AI specialists, he said.

“ASD will use artificial intelligence to maintain our capability edge, to defend Australia from rogue threats and help advance Australia’s national interests.

“In the spirit of transparency, there wouldn’t be an intelligence agency on this planet that would not be thinking today about how AI could be exploited, ASD included.”

Mr Burgess said artificial intelligence could be used to defend computer networks but also to “find vulnerabilities or find chinks in the armour” of rival networks.

Peter Singer, a world-renowned expert in technology and national security at the United States think tank New America, told the conference that out of the Fortune 500 companies in the US, 244 listed AI as “the core to their future business strategy”. “Besides being a business arms race, it’s a governmental arms race.”

China had declared its ambition to become the world leader in AI by 2030, whereas the US government was leaving progress to the private sector.

Mr Singer said the rapidly growing “Internet of Things”, made up of web-connected devices, would triple in the next five years.
Most countries were woefully underprepared for the consequences, he said.

“The responsibility for security is unclear. There is, at least in the United States and most western nations, no regulation. Even basic liability hasn’t been figured out. 

“Too often the devices lack even basic security features,” he said. “These ranged from “hackable trucks to hackable Barbie toys”.

But he said the politics and legal questions would likely sharpen quickly once cyber-attacks, which in the past have previously tended to revolve around data, would start to affect real-life objects.

Sydney Morning Herald

You Might Also Read:

Australian Spy Data Helps Business Cyber Threats:

 

« Get Ready For ePrivacy Regulation
Big Data Becomes Everyone's Job »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Stratogent

Stratogent

Stratogent does IT and Cybersecurity operations. We specialize in high-touch and high-change IT environments, especially in the biotech and pharma industry verticals.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

Aveshka

Aveshka

Aveshka is a professional services firm focused on addressing complex threats and challenges including Cybersecurity and Information Technology.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Aspisec

Aspisec

Aspisec is a cybersecurity company specialized in Firmware Security and Critical Infrastructure Protection.

Stage2Data

Stage2Data

Stage2Data is one of Canada’s most trusted cloud solution providers offering hosted Backup and Disaster Recovery Services.

GELLIFY

GELLIFY

GELLIFY is the first innovation platform dedicated to the high-tech B2B market, supporting start-ups and companies.

Netragard

Netragard

Netragard has an established reputation for providing high-quality offensive and defensive security services.

NANO Corp

NANO Corp

At NANO Corp, we keep your network visible, understandable, operational and secure with state-of-the-art technology.

Circle Security

Circle Security

Circle’s breakthrough security API unifies solutions for identity and data security into one architecture and empowers organizations to secure their identity, data and privacy in their applications.

Evolver

Evolver

Evolver delivers technology services and solutions that improve security, promote innovation, and maximize operational efficiency in support of government and commercial customers.

Ingenics Digital

Ingenics Digital

Ingenics Digital is a recognized initiator and leading service provider in the areas of software development and embedded systems.

C/side (cside)

C/side (cside)

At c/side, we're creating the ultimate delivery, performance and detection mechanism for browser-side fetched 3rd party Javascript.