Disturbing Uses of Artificial Intellegence

Its been a while since we have written about AI and robotics, but an article in Tech Republic got me inspired to discuss some of the more disturbing uses of autonomous machines, from least to most scary

  • AI Based Medical Treatment  – There are increasing advances in the use of artificial intelligence systems in the diagnosis and treatment of disease.
  • Using AI to Predict Future Events – The Nautilus computer system has been able to predict future events by analyzing information from millions of news articles going back to the 1940s.
  • Robot Lovers – And people think we are getting too impersonal because of all the time we spend playing with our phones!
  • Using AI Algorithms to Predict Crime – Just like Minority Report, some police departments are using AI to predict where crime will occur and who might be the perpetrator.
  • Deceptive Robots – We’ve written about this before.  Some researchers are teaching robots how to lie and hide from each other.  The military is interested.
  • Robot Survivalists – These robots have not been to kindergarten and learned about sharing.  These robots have been trained to compete for resourses, and keep them from other robots.
  • Robots With Schizophrenia – Researchers teach stories to robots and programmed them to retain many details in an effort to simulate excess of dopamine and hyper-learning.  These robots began to insert themselves into the stories and even take credit for actions that happened in the stories.
  • Using AI to Control Economic Markets – How soon before someone uses AI to move a market?  Economic warfare on the horizon?
  • Autonomous Drones and Weapons Systems – Don’t have to wait too long for this one to play out, we are very close already.
  • Autonomous Soldiers – And this one, too.  How about an autonomous soldier robot that is trained to deceive, hide, survive, predict the future, and is mildly schizophrenic?

I wonder if human beings will be able to survive their own inventiveness?  Fortunately, it seems that security is not being designed into robotic devices.  A recent article on Naked Security found that surveillance drones and self-driving cars can be hacked fairly easily.  So in that future described in the Terminator movies, a soldier with mad hacker skills will be a formidable adversary against the robot horde.

But of more immediate concern, as we add autonomous and mobile devices to the Internet of Things, the designers of these devices are failing to learn from the past, and are not always building security in from the start, but rather continuing to add it as an afterthought through patching and updating.  We can do better than this, and really desire better.


About the Author:

Cybersecurity analyst, pen-tester, trainer, and speaker. Serving small business owners in the St Paul, Minneapolis, and western Wisconsin area since 2001. Cybersecurity and hacking have been a passion of mine since I entered the computer and networking business in 2000. I hold several cybersecurity certifications including Certified Information Systems Security Professional (CISSP), Certified Advanced Security Pratitioner (CASP), and Certified Ethical Hacker (CEH). Other computer industry certifications include A+, Network+ and Microsoft Certified System Engineer (MCSE). As Cybersecurity Analyst at The WyzCo Group, I help our clients experience high levels of security on their computers, networks, and websites. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. We also provide Cybersecurity Awareness Training for clients and their employees. I am a frequent speakers at cybersecurity conferences such as the Minnesota Bloggers Conference, Secure360 Security Conference, the (ISC)2 World Congress, and the ISSA International Conference, and many local community organizations, Chambers of Commerce, SCORE, and several school districts. I have been blogging on cybersecurity since 2008.

Add a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.