Will Artificial Intelligence Beat Real Intelligence?

One of the persistent memes that interest me is the impending event sometimes known as “the singularity.”  This is a probable future where our electronic devices become self-aware and fully autonomous.  We see the beginnings of this happening all around us in devices like Amazon’s Alexa and Echo, The Nest and Google communities of smart devices, self-driving vehicles, and all the Internet of Things (IoT) devices that listen to us, observe our behaviors, preferences, and choices, and link back to an online controller that collects, parses, and analyzes the information.

All of this technical advancement relies on something called “machine learning.”  It turns out that machine learning is harder than it might seem, and like human learning, is only as good as the information that is provided to the learner.  In other words – garbage in – garbage out.

A series of recent posts on the Naked Security blog delve into this subject.  See the links below to read more.

In information security, machine learning is being used to create the next level of security devices and services that can detect new malicious exploits by combining machine learning with behavioral analysis and code analysis.  The issue that most concerns me is how hackable some machine learning systems are at this point.   A recent IoT disaster in waiting can be found in an article about an Internet connected car wash that was hacked at a recent Black Hat conference.  This makes machine learning enabled devices an interesting new attack vector for cyber-criminals, cyber-warriors, governments, and law enforcement agencies that want to snoop on your activities and data mine all the information that is going online.

So as we enthusiastically adopt these shiny new technologies, we may want to start thinking about how this information we so happily share could be used against us by people, and machines, that may not have our best interests in mind.  And just think of what could happen when SkyNet wakes up…

More information:

0

About the Author:

Cybersecurity guru to business owners in the St Paul, Minneapolis, and western Wisconsin area. Computer security and hacking have been a passion of mine since I entered the computer and networking business in 2000. In 2013 I completed a course of study and certification exam to become a Certified Ethical Hacker (CEH). In 2016 I was certified as a Certified Information Systems Security Professional (CISSP). As Senior Cybersecurity Engineer at Computer Integration Technologies, I help our clients experience high levels of computer security, network security, and web site security. In addition to consulting on security products and services, we also conduct security audits, vulnerability assessments and full penetration tests. We also provide Cybersecurity Awareness Training for clients and their employees. We also work with companies and organizations that need to certify compliance with regulations such as PCI-DSS (credit card processing), HIPAA/HITECH (medical records), and GLBA. The views expressed on this Web site are mine alone and do not necessarily represent the views of my employer.

Add a Comment