Top Cyber Spy Warns Against AI

Australia’s top cyber spy says the world needs to think more about risks created by over-reliance on artificial intelligence so that people don’t “sleepwalk” into dependence on machines they don’t actually understand. In a rare public speech, Mike Burgess, Director-General of the Australian Signals Directorate (pictured), also said spy agencies around the world, including his own, were increasingly using artificial intelligence to carry out their covert activities.

“It is right the world embraces artificial intelligence, but we must embrace this with our eyes wide open. We should not sleepwalk into this, where we suddenly find ourselves in the world that is controlled by software and very few people understand how it works,” Mr Burgess told a conference on artificial intelligence hosted by the Australian Strategic Policy Institute.

“How much of our world will be outsourced AI? How much of our brain power and decision-making will we hand over?

“It’s great … for productivity and the economy and society, but with those same great benefits come serious risks that require serious thinking … and I don’t think we’ve done enough of that thinking to date.”

Artificial intelligence, or AI, includes machine learning, data analytics, data mining and automation. The main uses revolve around solving problems by analysing large amounts of data to pick patterns that a human either couldn’t spot or would take much longer to do.

Mr Burgess said he had seen “unsupervised machine learning” operate very effectively. His agency gathers electronic or “signals” intelligence, protects Australian government computers and attacks foreign networks to support military operations or to counter terrorism and serious cyber-crime. It has its own AI specialists, he said.

“ASD will use artificial intelligence to maintain our capability edge, to defend Australia from rogue threats and help advance Australia’s national interests.

“In the spirit of transparency, there wouldn’t be an intelligence agency on this planet that would not be thinking today about how AI could be exploited, ASD included.”

Mr Burgess said artificial intelligence could be used to defend computer networks but also to “find vulnerabilities or find chinks in the armour” of rival networks.

Peter Singer, a world-renowned expert in technology and national security at the United States think tank New America, told the conference that out of the Fortune 500 companies in the US, 244 listed AI as “the core to their future business strategy”. “Besides being a business arms race, it’s a governmental arms race.”

China had declared its ambition to become the world leader in AI by 2030, whereas the US government was leaving progress to the private sector.

Mr Singer said the rapidly growing “Internet of Things”, made up of web-connected devices, would triple in the next five years.
Most countries were woefully underprepared for the consequences, he said.

“The responsibility for security is unclear. There is, at least in the United States and most western nations, no regulation. Even basic liability hasn’t been figured out. 

“Too often the devices lack even basic security features,” he said. “These ranged from “hackable trucks to hackable Barbie toys”.

But he said the politics and legal questions would likely sharpen quickly once cyber-attacks, which in the past have previously tended to revolve around data, would start to affect real-life objects.

Sydney Morning Herald

You Might Also Read:

Australian Spy Data Helps Business Cyber Threats:

 

« Get Ready For ePrivacy Regulation
Big Data Becomes Everyone's Job »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Council of European Professional Informatics Societies (CEPIS)

Council of European Professional Informatics Societies (CEPIS)

CEPIS is the representative body of national informatics associations throughout Europe and represent over 450,000 ICT and informatics professionals in 32 countries.

National Center for Manufacturing Sciences (NCMS) - USA

National Center for Manufacturing Sciences (NCMS) - USA

NCMS is a cross-industry technology development consortium, dedicated to improving the competitiveness of the US industrial base. Strategic initiatives include industrial cyber security.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

Dutch Accreditation Council (RvA)

Dutch Accreditation Council (RvA)

RvA is the national accreditation body for the Netherlands. The directory of members provides details of organisations offering certification services for ISO 27001.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Plug and Play Tech Center

Plug and Play Tech Center

Plug and Play is the ultimate innovation platform, bringing together the best startups and the world’s largest corporations.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

Inflexor Ventures

Inflexor Ventures

Inflexor Ventures is a technology focused venture capital firm that invests in early stage companies from seed to Series-A+ stages.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Syracom

Syracom

syracom is a consultancy firm specialized in development of efficient business processes. With our expertise and IT competence, we develop tailored solutions for customers in various industries.

Blackpanda

Blackpanda

Blackpanda is Asia’s premier cyber security incident response group, hyper-focused on digital forensics and cyber crisis response.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.

Creative Network Innovations (CNI)

Creative Network Innovations (CNI)

Creative Network Innovations is a leader in providing advanced IT and cybersecurity solutions.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.