The foreign media's DefenseOne website reported that 26 artificial intelligence experts from 14 industry and academic institutions have authored the report "Personal Intelligence's Malicious Use: Prediction, Prevention, and Mitigation." The 100-page report points out that AI technology is a "double-edged sword" with a "dual-use" attribute that the technology can make thousands of complex decisions per second. This capability can be used For the benefit of mankind, it can also be used to disrupt order, and it is entirely up to the people who design the system. In the report, experts discussed the existing malicious use cases of artificial intelligence that may exist or may emerge in the next five years, and the potential security threats that they pose, and divided them into three groups: digital threats, physical threats, and political threats. Finally, it proposes ways to better predict, prevent, and mitigate these threats.

1. Potential security threats of AI technology

(1) Digital threats: (1) Stealing information through automatic fishing or creating fake e-mails, websites, links, etc.; (2) Faster hacking through automatic discovery of software vulnerabilities; (3) Using artificial intelligence to deceive the understanding of external flaws in artificial intelligence. system.

(2) Physical threats: (1) The use of commercial drones or unmanned vehicles as weapons to automate terrorism; (2) Robot clusters, in which a large number of autonomous robots operate around common goals; (3) Remote attacks, since automatic robots do not have to Any distance is controlled within the set distance, thus enabling remote attacks.

(3) Political threats: 1 Propaganda through easy-to-generate fake images and videos; 2 Automatically dispel dissent through techniques such as automatically finding and deleting texts or images; 3 persuading people to persuade them with personal information using open information.

2. Related suggestions

With the increasing strength and popularity of artificial intelligence technology, the report predicts that the threat posed by artificial intelligence systems will constantly change, such as the expansion of existing threats, the emergence of new threats, and changes in the characteristics of typical threats. In response to the changing threat environment, the report made four advanced recommendations:

(1) Decision makers should work closely with technical researchers to investigate, prevent, and mitigate the potential malicious use of artificial intelligence;

(2) Artificial intelligence researchers and engineers should seriously consider the "double-edged sword" nature of their work, consider the influence of misuse and other factors, adjust the corresponding research priorities and norms, and actively contact relevant organizations in the foreseeable harmful applications. ;

(3) For areas of research that can maturely and properly address the "double-edged sword" problem, such as computer security, identify best practice cases and apply them to the field of artificial intelligence;

(4) Expand the scope of stakeholders and field experts and actively explore related challenges.

In addition, the report also proposes to explore open issues and potential interventions in four priority research areas: learning from cybersecurity communities; exploring different open models; creating a responsible cultural atmosphere; and developing technical and policy solutions.

The report pointed out that the dual use of AI intervention requires not only the attention and actions of artificial intelligence researchers and companies, but also the attention and actions of legislators, public servants, regulators, security researchers and educators.

Potential Security Threats and Suggestions for AI Technology

Headphone cover

Headphone Cover,Earbuds Cover,Earphone Cover,Headset Covers

Nantong Boxin Electronic Technology Co., Ltd. , https://www.ntbosen.com