{"id":342,"date":"2018-11-05T00:04:46","date_gmt":"2018-11-05T00:04:46","guid":{"rendered":"http:\/\/techclot.com\/index.php\/2018\/11\/05\/criminals-are-working-on-exploiting-artificial-intelligence\/"},"modified":"2018-11-05T00:04:46","modified_gmt":"2018-11-05T00:04:46","slug":"criminals-are-working-on-exploiting-artificial-intelligence","status":"publish","type":"post","link":"https:\/\/techclot.com\/index.php\/2018\/11\/05\/criminals-are-working-on-exploiting-artificial-intelligence\/","title":{"rendered":"Criminals are Working on Exploiting Artificial Intelligence"},"content":{"rendered":"<p>You check your voicemail \u2013 it\u2019s your daughter, panicking, garbled. She\u2019s travelling, away on her gap year. You\u2019ve had a series of emails from her \u2013 she\u2019s lost her phone and money, she needs help. Now, you\u2019re tech savvy; you\u2019re not easy to con. But this is her \u2013 her voice. You wire the money.<\/p>\n<p>However, across the world, a thousand other parents have received their own personalised emails and voicemails. A criminal\u2019s algorithm has scraped social media for holiday videos and photos and created finely-targeted, tailor-made messages. The voice on your phone was synthesised. This was all done at low cost with minimal human labour, through the use of artificial intelligence.<\/p>\n<p>AI has recently made significant progress, which unfortunately also make scenarios like the one above increasingly plausible.<\/p>\n<p>But as our new report, released today, makes clear, AI technology is \u2018dual-use.\u2019 While it will be used to benefit society in many ways, it can and will also be used maliciously. Criminals, terrorists and rogue states will exploit these powerful tools to harm people. We must explore ways to more systematically forecast, prevent, and mitigate these malicious uses.<\/p>\n<p>  \t<a href=\"http:\/\/www.wired.co.uk\/article\/ai-security-malicious-threats-open-ai-cambridge-cser\" class=\"sqs-block-button-element--small sqs-block-button-element\" target=\"_blank\">Learn More<\/a><br \/>\n<a rel=\"nofollow\" href=\"https:\/\/www.artificial-intelligence.blog\/news\/criminals-are-working-on-exploiting-artificial-intelligence\">2018 Artificial Intelligence (AI) News<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You check your voicemail \u2013 it\u2019s your daughter, panicking, garbled. She\u2019s travelling, away on her&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2336,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[331,1244,1245,332,1064],"class_list":["post-342","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artificial-intelligence","tag-artificial","tag-criminals","tag-exploiting","tag-intelligence","tag-working"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/techclot.com\/wp-content\/uploads\/2020\/08\/4G1jb9.jpg?fit=500%2C325&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p3orZX-5w","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts\/342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/comments?post=342"}],"version-history":[{"count":0,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/posts\/342\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/media\/2336"}],"wp:attachment":[{"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/media?parent=342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/categories?post=342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techclot.com\/index.php\/wp-json\/wp\/v2\/tags?post=342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}