Criminally Exploiting AI Tools To Generate Illicit Revenue From Music Streaming

A US musician has been charged with using Artificial Intelligence (AI) tools and thousands of bots to fraudulently stream songs billions of times, so that he could claim millions of dollars in royalties. 

Michael Smith aged 52, of North Carolina, has been charged with three counts of wire fraud, wire fraud conspiracy and money laundering conspiracy charges. Smith allegedly concealed his actions by using fake names and employing a large network of individuals and technology to evade detection from streaming platforms’ anti-fraud systems.

Smith is alleged to have used hundreds of thousands of AI-generated songs to manipulate music streams. The tracks were streamed billions of times across multiple platforms by thousands of automated bot accounts to avoid detection. Smith claimed more than $10m in royalty payments over the course of the scheme, which spanned several years.

According to the Indictment, Smith was sometimes operating as many as 10,000 active bot accounts to stream his AI-generated tracks. It is alleged that the tracks in question were provided to Smith through a partnership with the chief executive of an unnamed AI music company, dating from  2018. The co-conspirator is said to have supplied him with thousands of tracks a month in exchange for track metadata, such as song and artist names, as well as a monthly cut of streaming revenue.

The wider rise of AI-generated music and the increased availability of free tools to make tracks, have added to concerns for artists and record labels about receiving their correct share of profits made on AI-created tracks.

#Tools that can create text, images, video, audio in response to prompts are underpinned by systems that have been "trained" on vast quantities of data, such as online text and images scraped, often indiscriminately, from across the web. 

Content that actually belongs to other artists, or is protected by copyright, has been collected to form part of some of the training data for such tools. This has generated outrage amongst artists, musicians and actors, who feel their work is being illegally exploited  to generate seemingly original material, without due recognition or reward.

US Dept. of Justice   |   BBC   |    SlashDot   |    Rolling Stone   |    Proactive Investors   |    Yahoo 

Image: Alexander Shatov

You Might Also Read: 

Hollywood Stars Strike Over AI Human Replacements:


If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Telegram Disables Features Used For Illegal Activity
Social Media, Misinformation & The US Elections »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Vera Security

Vera Security

Vera is a data security platform that provides 360-degree visibility and control over critical business data, anywhere it's shared or stored.

NXP Semiconductors

NXP Semiconductors

NXP is a world leader in secure connectivity solutions for embedded applications and the Internet of Things.

EG-CERT

EG-CERT

EG-CERT is the national Computer Emergency Response Team for Egypt.

Elastic

Elastic

Elastic is the world's leading software provider for making structured and unstructured data usable in real time for search, logging, security, and analytics use cases.

ITC Secure Networking

ITC Secure Networking

ITC are a leading cloud-based MSSP delivering service innovation in cyber security analytics & cloud technology.

GuidePoint Security

GuidePoint Security

GuidePoint Security provide information security solutions that enable commercial and federal organizations to more successfully achieve their security and business goals.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

Nassec

Nassec

Nassec is a Cyber Security firm dedicated to providing the best vulnerability management solutions. We offer tailor-made cyber security solutions based upon your requirements and nature of business.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

Riot Security

Riot Security

In today's world, most successful cyberattacks start by a human failure. Riot have developed a platform that makes it easy to prepare your employees for cyberattacks, in a way they love.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

vpnMentor

vpnMentor

We started vpnMentor to offer users a really honest, committed and helpful tool when navigating VPNs and web privacy.

SecuLore

SecuLore

An innovator in public-safety-focused cybersecurity, SecuLore is dedicated to protecting critical infrastructure from cyber attacks.