NSA Warning: China Is Stealing AI Technology

The US National Security Agency is telling US tech companies to be aware of Chinese attempts to steal their Artificial Intelligence (AI) technology. The Pentagon’s cyber intelligence chief was warning about what China might do with these new tools. “We think much about the ability of what AI is going to do for us in the future. One of the things that we have communicated very clearly to a number of the US companies is the importance of securing the intellectual property that you have invested within this." General Paul Nakasone said. 

“This type of capability because this will be a target of our adversaries,” he told the House Armed Services cyber and intelligence subcommittee recently. The General, who is head of both the NSA and Cyber Command, didn’t mention China by name, but Nakasone says that China is the top nation-state threat to US intellectual property. 

Enormous investments and leading scientists and engineers have been engaged in the rise of new public Large Language Model (LLM) facing AI programs like ChatGPT, which can provide complex, human-like answers to a wide number of prompts. Bots like ChatGPT may not be able to pull off the next big Microsoft server worm or Colonial Pipeline ransomware exploit but they may help criminal gangs and nation-state hackers develop some attacks against IT, according to Rob Joyce, director of the NSA's Cybersecurity Directorate.

These generative pre-trained transformers have proven widely useful for everything from writing research papers, to finding Chinese weather balloons. But many of them achieve their miraculous effects by simply pulling information from the open Internet where some info is not accurate or correct. 

Additionally, as much as 11 percent of the data that employees put into ChatGPT and other new AI engines to get answers is proprietary or confidential, according to analysis from software firm Cyberhaven. 

Intelligence agencies will have to be cautious in employing such models and be certain of the providence of the data that feeds them, Ronald Moultrie, defense undersecretary for intelligence, told the House Committee. “We know our adversaries are considering or already thinking about large data models if you will, and how they may use that against us, he said. “Our...being able to identify when something is actually an AI-generated outcome is something that's gonna be very important to us, too.”

The Chinese government is investing heavily in its national plan to become the world leader in AI by 2030. and the US intelligence establishment needs to become better attuned to how adversaries might use similar AI engines to create disinformation. 

Cyberhaven:    DefenseOne:    CyberCom:    Microsoft:    The Register:    NDU / Richard Andres    @StephSmith

You Might Also Read: 

China Mandates Security Reviews For AI Services Like ChatGPT:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

 


Cyber Security Intelligence: Captured Organised & Accessible


 

« Ransomware Attack Hits US Shipyard
What The Latest Cybersecurity Trends Mean For Your SME  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CW Jobs

CW Jobs

CWJobs.co.uk is a leading specialist IT recruitment website covering all areas of IT including Cyber Security.

USNA Center for Cyber Security Studies

USNA Center for Cyber Security Studies

The mission of the Center for Cyber Security Studies is to enhance the education of midshipmen in all areas of cyber warfare.

Kramer Levin

Kramer Levin

Kramer Levin is a full-service law firm with offices in New York and Paris. Practice areas include Cybersecurity, Privacy and Data Protection.

US Cyber Command (USCYBERCOM)

US Cyber Command (USCYBERCOM)

USCYBERCOM conducts activities to ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

International Computer Science Institute (ICSI)

International Computer Science Institute (ICSI)

ICSI is a leading independent, nonprofit center for research in computer science. Research areas include network security and privacy.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

Cysiv

Cysiv

Cysiv SOC-as-a-Service combines all the elements of an advanced, proactive, threat hunting SOC, with a managed security stack for hybrid cloud, network, and endpoint security.

Fly Ventures

Fly Ventures

Fly Ventures is a seed-stage venture capital fund for outstanding teams building Enterprise and Deep Tech startups in Europe.

Secure Ideas

Secure Ideas

Secure Ideas is focused on penetration testing and application security including web applications, web services and mobile applications.

Riskaware

Riskaware

CyberAware, by Riskaware, provides business-critical cyber attack analysis and impact assessments using NIST standards aligned with NCSC guidance.

InfoSystems Inc

InfoSystems Inc

InfoSystems provides reliable IT solutions to build and maintain strong and secure systems for both SMB and enterprise organizations.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

Centre for Cyber Security Research and Innovation (CSRI) - Deakin University

CSRI solves the cyber security threats of tomorrow, today. We work with industry and government leaders on innovative research that has real-world impact.

US Digital Corps

US Digital Corps

The U.S. Digital Corps is a new two-year fellowship for early-career technologists where you will work every day to make a difference in critical impact areas including cybersecurity.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.