Top Cyber Spy Warns Against AI

Australia’s top cyber spy says the world needs to think more about risks created by over-reliance on artificial intelligence so that people don’t “sleepwalk” into dependence on machines they don’t actually understand. In a rare public speech, Mike Burgess, Director-General of the Australian Signals Directorate (pictured), also said spy agencies around the world, including his own, were increasingly using artificial intelligence to carry out their covert activities.

“It is right the world embraces artificial intelligence, but we must embrace this with our eyes wide open. We should not sleepwalk into this, where we suddenly find ourselves in the world that is controlled by software and very few people understand how it works,” Mr Burgess told a conference on artificial intelligence hosted by the Australian Strategic Policy Institute.

“How much of our world will be outsourced AI? How much of our brain power and decision-making will we hand over?

“It’s great … for productivity and the economy and society, but with those same great benefits come serious risks that require serious thinking … and I don’t think we’ve done enough of that thinking to date.”

Artificial intelligence, or AI, includes machine learning, data analytics, data mining and automation. The main uses revolve around solving problems by analysing large amounts of data to pick patterns that a human either couldn’t spot or would take much longer to do.

Mr Burgess said he had seen “unsupervised machine learning” operate very effectively. His agency gathers electronic or “signals” intelligence, protects Australian government computers and attacks foreign networks to support military operations or to counter terrorism and serious cyber-crime. It has its own AI specialists, he said.

“ASD will use artificial intelligence to maintain our capability edge, to defend Australia from rogue threats and help advance Australia’s national interests.

“In the spirit of transparency, there wouldn’t be an intelligence agency on this planet that would not be thinking today about how AI could be exploited, ASD included.”

Mr Burgess said artificial intelligence could be used to defend computer networks but also to “find vulnerabilities or find chinks in the armour” of rival networks.

Peter Singer, a world-renowned expert in technology and national security at the United States think tank New America, told the conference that out of the Fortune 500 companies in the US, 244 listed AI as “the core to their future business strategy”. “Besides being a business arms race, it’s a governmental arms race.”

China had declared its ambition to become the world leader in AI by 2030, whereas the US government was leaving progress to the private sector.

Mr Singer said the rapidly growing “Internet of Things”, made up of web-connected devices, would triple in the next five years.
Most countries were woefully underprepared for the consequences, he said.

“The responsibility for security is unclear. There is, at least in the United States and most western nations, no regulation. Even basic liability hasn’t been figured out. 

“Too often the devices lack even basic security features,” he said. “These ranged from “hackable trucks to hackable Barbie toys”.

But he said the politics and legal questions would likely sharpen quickly once cyber-attacks, which in the past have previously tended to revolve around data, would start to affect real-life objects.

Sydney Morning Herald

You Might Also Read:

Australian Spy Data Helps Business Cyber Threats:

 

« Get Ready For ePrivacy Regulation
Big Data Becomes Everyone's Job »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Celestix Networks

Celestix Networks

Celestix is a global provider of secure network solutions that enable the simple deployment of secure remote access connectivity.

Miller Group

Miller Group

Miller Group is an IT managed service provider. We proactively monitor and manage your entire business computer network. Services include backup & recovery and cyber security.

Leviathan Security Group

Leviathan Security Group

Leviathan provides a broad set of information security services ranging from low-level technical engineering to strategic business consulting.

Reblaze Technologies

Reblaze Technologies

Reblaze provides the world’s best security technologies in a cloud-based website security platform.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

TROOPERS

TROOPERS

TROOPERS InfoSec event consists of two days of high-end training, followed by a two-day, three-track conference, culminating in Roundtables on the final day.

Belle de Mai Incubator

Belle de Mai Incubator

Belle de Mai Incubator supports and funds innovative startup ideas in digital industries.

Plexal

Plexal

Plexal is East London's innovation centre and co-working space. We offer startups flexible memberships, giving them access to office space plus all the benefits and support they need to scale.

eSec Forte Technologies

eSec Forte Technologies

eSec Forte Technologies is a CMMI Level-3 ISO 9001-2008, 27001-2013 certified global consulting and implementation company focused on Information Security and Cyber Security.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Eastern Cyber Resilience Centre (ECRC)

Eastern Cyber Resilience Centre (ECRC)

The Eastern Cyber Resilience Centre is part of the national roll out of Cyber Resilience Centres in the UK which began in 2019.

International College For Security Studies (ICSS)

International College For Security Studies (ICSS)

ICSS India offers technical education to students, clients and partners in IT Industry by our well qualified, certified and experienced trainers.

PlexTrac

PlexTrac

PlexTrac is a cybersecurity reporting and workflow management platform that supercharges security programs, making them more effective, efficient, and proactive.

Ascent Solutions

Ascent Solutions

Ascent is built to help firms evolve their cybersecurity posture, modernize their Microsoft solutions, and accelerate their journey to the cloud.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.