augmented intelligence certification (AI), all that’s needed to create a <a href="https://www.google.com/url?client=internal-uds-cse&cx=016722361883844155001:yfaatio9mvc&q=https://bernardmarr.com/default.asp%3FcontentID%3D1874&sa=U&ved=2ahUKEwjNh5jMxd_kAhVMUxoKHaImA00QFjAAegQIABAB&usg=AOvVaw0nDW1ycqpxytaTvUyzZXSR" target="_blank" class="color-link">clone of someone’s voice</a> is just a snippet of audio. Similarly, AI can take several photos or videos of a person and then create an entirely new—<a href="https://www.youtube.com/watch?v=1guTVNp3nzA" target="_blank" class="color-link">cloned—video</a> that appears to be an original. It’s become quite easy for AI to create an artificial YOU and the results are so convincing our brains have trouble differentiating between what is real and what is cloned.<a href="https://bernardmarr.com/default.asp?contentID=1927" target="_blank" class="color-link"> Deepfake technology</a> that uses facial mapping, machine learning, and augmented intelligence certification to create representations of real people doing and saying things they never did is now targeting "ordinary" people. Celebrities used to be more susceptible to being victims of deepfake technology because there was abundant video and audio of them to use to train the algorithms. However, the technology has advanced to the point that it doesn’t require as much raw data to create a convincing fake video, plus there are a lot more images and videos of ordinary people from the internet and social media channels to use. </p><p>5. Ransomware, AI and Bot-enabled Blackmailing and Hacking </p><p>When high-powered technology falls into the wrong hands, it can be very effective to achieve criminal, immoral, and malicious activities.<a href="https://www.us-cert.gov/Ransomware" target="_blank" class="color-link"> Ransomware</a>, where malware is used to prevent access to a computer system until a ransom is paid, is on the rise according to the Cybersecurity and Infrastructure Security Agency (CISA). Augmented intelligence certification can automate tasks to get them done more efficiently. When those tasks, such as spear phishing, are to send out fake emails to trick people into giving up their private information, the negative impact could be extraordinary. Once the software is built, there is little-to-no cost to keep repeating the task over again. AI can quickly and efficiently blackmail people or hack into systems. Although AI is playing a significant role to combat malware and other threats, it’s also being used by cybercriminals to perpetrate the crimes. </p><div class="vestpocket" vest-pocket></div><p>6. Smart Dust </p><p>Microelectromechanical systems (MEMS), the size of a grain of salt, have sensors, communication mechanisms, autonomous power supplies, and cameras in them. Also called motes, this<a href="https://www.forbes.com/sites/bernardmarr/2018/09/16/smart-dust-is-coming-are-you-ready/#4c34d6665e41" target="_blank" class="color-link"> smart dust</a> has a plethora of positive uses in healthcare, security, and more, but would be frightening to control if used for evil pursuits. While<a href="https://defence.pk/pdf/threads/smart-dust-for-spying-purposes-developed-by-darpa-for-us-military.612114/" target="_blank" class="color-link"> spying on a known enemy</a> with smart dust could fall into the positive column, the invasion of a private citizen’s privacy would be just as easy. </p><p>7. Fake News Bots </p><p><a href="https://futurism.com/ai-generates-fake-news" target="_blank" class="color-link">GROVER</a> is one AI system capable of writing a fake news article from nothing more than a headline. AI systems such as GROVER create articles more believable than those written by humans. OpenAI, a nonprofit company backed by Elon Musk, created<a href="https://www.theguardian.com/technology/2019/feb/14/elon-musk-backed-ai-writes-convincing-news-fiction" target="_blank" class="color-link"> “deepfakes for text”</a> that produces news stories and works of fiction so good, the organization initially decided not to release the research publicly to prevent dangerous misuse of the technology. When fake articles are promoted and shared as true, it can have serious ramifications for individuals, businesses, and governments. </p><div class="embedly-align "><fbs-embedly style="padding-bottom: 56.21%;" iframe-src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FAajMRLIVA_E%3Ffeature%3Doembed&url=http%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DAajMRLIVA_E&image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FAajMRLIVA_E%2Fhqdefault.jpg&key=3ce26dc7e3454db5820ba084d28b4935&type=text%2Fhtml&schema=youtube"></fbs-embedly></div><p>Along with the positive uses of today’s technology, there is no doubt that it can be very dangerous in the wrong hands. </p>”>
As we enter new frontiers with the latest technological innovation trends and take pleasure in the lots of positive impacts and gains it can have on the way we do the job, engage in and live, we should normally be mindful and put together for doable damaging impacts and possible misuse of the technologies. Listed here are seven of the most harmful know-how trends:
1. Drone Swarms
The British, Chinese, and United States armed forces are screening how interconnected, cooperative drones could be employed in armed service functions. Influenced by a swarm of insects doing the job jointly, drone swarms could revolutionize upcoming conflicts, irrespective of whether it be by overpowering enemy sensors with their numbers or to efficiently include a large region for search-and-rescue missions. The variation in between swarms and how drones are utilised by the navy right now is that the swarm could manage itself centered on the scenario and by means of interactions with each and every other to attain a objective. Even though this know-how is however in the experimentation stage, the reality of a swarm that is wise ample to coordinate its own behavior is moving closer to reality. Apart from the positive positive aspects of drone swarms to lessen casualties, at minimum for the offense, and additional successfully obtain a search-and-rescue objective, the assumed of devices geared up with weapons to destroy getting able to “feel” for by themselves is fodder for nightmares. In spite of the detrimental possibilities, there would seem to be tiny question that swarm armed forces technological innovation will inevitably be deployed in upcoming conflicts.
2. Spying Smart Home Devices
For intelligent property devices to answer to queries and be as helpful as attainable, they need to have to be listening and monitoring info about you and your standard habits. When you added the Echo to your room as a radio and alarm clock (or any other clever system linked to the World-wide-web), you also authorized a spy to enter your home. All the details clever gadgets collect about your habits these types of as your viewing heritage on Netflix wherever you are living and what route you just take household so Google can tell you how to prevent site visitors and what time you usually get there property so your clever thermostat can make your family area the temperature you prefer, is saved in the cloud. Of course, this details tends to make your lifetime much more effortless, but there is also the possible for abuse. In theory, digital assistant gadgets pay attention for a “wake term,” ahead of they activate, but there are cases when it could possibly consider you stated the wake phrase and get started recording. Any clever gadget in your property, like gaming consoles and clever TVs, could be the entry issue for abuse of your individual details. There are some defensive tactics this sort of as masking up cameras, turning off products when not needed and muting microphones, but none of them are 100% foolproof.
3. Facial Recognition
There are some extremely useful apps for facial recognition, but it can just as simply be made use of for sinister applications. China stands accused of using facial recognition know-how for surveillance and racial profiling. Not only do China’s cameras location jaywalkers, but they have also monitored and controlled Uighur Muslims who live in the region. Russia’s cameras scan the streets for “people today of desire,” and there are studies that Israel tracks Palestinians within the West Lender. In addition to monitoring people today devoid of their understanding, facial recognition is plagued with bias. When an algorithm is qualified on a dataset that isn’t really diverse, it is significantly less precise and will misidentify folks more.
4. AI Cloning
With the support of augmented intelligence certification (AI), all that’s needed to create a clone of someone’s voice is just a snippet of audio. In the same way, AI can take numerous pics or films of a person and then build an entirely new—cloned—video that appears to be an initial. It is turn into very quick for AI to make an artificial YOU and the success are so convincing our brains have difficulties differentiating amongst what is genuine and what is cloned. Deepfake technology that uses facial mapping, machine learning, and augmented intelligence certification to generate representations of true individuals carrying out and expressing points they under no circumstances did is now concentrating on “ordinary” men and women. Celebrities utilized to be far more vulnerable to being victims of deepfake technology for the reason that there was considerable movie and audio of them to use to educate the algorithms. Nonetheless, the technological innovation has innovative to the point that it does not require as much uncooked information to build a convincing fake video, in addition there are a large amount much more images and movies of common folks from the web and social media channels to use.
5. Ransomware, AI and Bot-enabled Blackmailing and Hacking
When higher-powered technology falls into the improper palms, it can be extremely powerful to attain legal, immoral, and destructive things to do. Ransomware, where malware is employed to stop entry to a laptop or computer program right until a ransom is paid, is on the increase in accordance to the Cybersecurity and Infrastructure Safety…