Top Cyber Spy Warns Against AI

Australia’s top cyber spy says the world needs to think more about risks created by over-reliance on artificial intelligence so that people don’t “sleepwalk” into dependence on machines they don’t actually understand. In a rare public speech, Mike Burgess, Director-General of the Australian Signals Directorate (pictured), also said spy agencies around the world, including his own, were increasingly using artificial intelligence to carry out their covert activities.

“It is right the world embraces artificial intelligence, but we must embrace this with our eyes wide open. We should not sleepwalk into this, where we suddenly find ourselves in the world that is controlled by software and very few people understand how it works,” Mr Burgess told a conference on artificial intelligence hosted by the Australian Strategic Policy Institute.

“How much of our world will be outsourced AI? How much of our brain power and decision-making will we hand over?

“It’s great … for productivity and the economy and society, but with those same great benefits come serious risks that require serious thinking … and I don’t think we’ve done enough of that thinking to date.”

Artificial intelligence, or AI, includes machine learning, data analytics, data mining and automation. The main uses revolve around solving problems by analysing large amounts of data to pick patterns that a human either couldn’t spot or would take much longer to do.

Mr Burgess said he had seen “unsupervised machine learning” operate very effectively. His agency gathers electronic or “signals” intelligence, protects Australian government computers and attacks foreign networks to support military operations or to counter terrorism and serious cyber-crime. It has its own AI specialists, he said.

“ASD will use artificial intelligence to maintain our capability edge, to defend Australia from rogue threats and help advance Australia’s national interests.

“In the spirit of transparency, there wouldn’t be an intelligence agency on this planet that would not be thinking today about how AI could be exploited, ASD included.”

Mr Burgess said artificial intelligence could be used to defend computer networks but also to “find vulnerabilities or find chinks in the armour” of rival networks.

Peter Singer, a world-renowned expert in technology and national security at the United States think tank New America, told the conference that out of the Fortune 500 companies in the US, 244 listed AI as “the core to their future business strategy”. “Besides being a business arms race, it’s a governmental arms race.”

China had declared its ambition to become the world leader in AI by 2030, whereas the US government was leaving progress to the private sector.

Mr Singer said the rapidly growing “Internet of Things”, made up of web-connected devices, would triple in the next five years.
Most countries were woefully underprepared for the consequences, he said.

“The responsibility for security is unclear. There is, at least in the United States and most western nations, no regulation. Even basic liability hasn’t been figured out. 

“Too often the devices lack even basic security features,” he said. “These ranged from “hackable trucks to hackable Barbie toys”.

But he said the politics and legal questions would likely sharpen quickly once cyber-attacks, which in the past have previously tended to revolve around data, would start to affect real-life objects.

Sydney Morning Herald

You Might Also Read:

Australian Spy Data Helps Business Cyber Threats:

 

« Get Ready For ePrivacy Regulation
Big Data Becomes Everyone's Job »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Tresorit

Tresorit

Tresorit helps teams to collaborate securely and easily by protecting their data with end-to-end encryption.

Engage Black

Engage Black

Engage Black provides solutions for securing and protecting cryptographic keys, data at rest, and data in motion.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

PCI Pal

PCI Pal

PCI Pal’s secure cloud payment solutions are certified to the highest level of security by the leading card companies.

GreyCampus

GreyCampus

GreyCampus is a leading provider of training for working professionals in the areas of Project Management, Big Data, Data Science, Service Management, Quality Management and Information Security.

Italtel

Italtel

Italtel is a multinational ICT company that combines networks and communications services with the ability to innovate and develop solutions for digital transformation.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

World Cyber Security Summit

World Cyber Security Summit

World Cyber Security Summit, by Trescon, is a thought-leadership driven platform for CISOs who are looking to explore new-age threats and the technologies/strategies that can help mitigate them.

The Citadel Department of Defense Cyber Institute (CDCI)

The Citadel Department of Defense Cyber Institute (CDCI)

CDCI is established to address the critical national security needed for a skilled cybersecurity workforce.

GajShield

GajShield

GajShield Infotech provides Data Security Firewall solutions to Corporate’s and Government agencies.

Stacklet

Stacklet

Stacklet provides cloud governance as code platform that accelerates how Global 2000 manages its security, asset visibility, operations, and cost optimization policies in the cloud.

Bastazo

Bastazo

Bastazo provides tools for vulnerability and patch management. Focus your cybersecurity operations on vulnerabilities with the highest risk of exploitation.

Baidam Solutions

Baidam Solutions

Baidam Solutions is a 100% Australian owned and operated First Nations information technology business.

Hunt & Hackett

Hunt & Hackett

Hunt & Hackett helps European companies prevent, detect and respond to today’s most advanced adversaries, safeguarding them against cyberthreats and espionage.

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.