Preparing For the Malicious Use of Artificial Intelligence

Increasingly sophisticated AI will usher in a world that is strange and different from the one we're used to, and there are serious risks if this technology is used for the wrong ends.


OpenAI has co-authored a paper that forecasts how malicious actors could misuse Artificial Intelligence (AI) technology and potential ways they can prevent and mitigate these threats.

This paper is the outcome of almost a year of sustained work with their colleagues at the Future of Humanity Institute, the Centre for the Study of Existential Risk, the Center for a New American Security, the Electronic Frontier Foundation, and others.

AI challenges global security because it lowers the cost of conducting many existing attacks, creates new threats and vulnerabilities, and further complicates the attribution of specific attacks.

Given the changes to the threat landscape that AI seems to bring, the report makes some high-level recommendations that companies, research organizations, individual practitioners, and governments can take to ensure a safer world:

  • Acknowledge AI’s dual-use nature: AI is a technology capable of immensely positive and immensely negative applications. We should take steps as a community to better evaluate research projects for perversion by malicious actors, and engage with policymakers to understand areas of particular sensitivity. As we write in the paper: “Surveillance tools can be used to catch terrorists or oppress ordinary citizens. Information content filters could be used to bury fake news or manipulate public opinion. Governments and powerful private actors will have access to many of these AI tools and could use them for public good or harm.” Some potential solutions to these problems include pre-publication risk assessments for certain bits of research, selectively sharing some types of research with a significant safety or security component among a small set of trusted organizations, and exploring how to embed norms into the scientific community that are responsive to dual-use concerns.
  • Learn from cybersecurity: The computer security community has developed various practices that are relevant to AI researchers, which we should consider implementing in our own research. These range from “red teaming” by intentionally trying to break or subvert systems, to investing in tech forecasting to spot threats before they arrive, to conventions around the confidential reporting of vulnerabilities discovered in AI systems, and so on.
  • Broaden the discussion: AI is going to alter the global threat landscape, so we should involve a broader cross-section of society in discussions. Parties could include those involved in the civil society, national security experts, businesses, ethicists, the general public, and other researchers.

 

Like their work on concrete problems in AI safety, they’ve grounded some of the problems motivated by the malicious use of AI in concrete scenarios, such as:

  • persuasive ads generated by AI systems being used to target the administrator of security systems;
  • cybercriminals using neural networks and “fuzzing” techniques to create computer viruses with automatic exploit generation capabilities;
  • malicious actors hacking a cleaning robot so that it delivers an explosives payload to a VIP; and
  • rogue states using omnipresent AI-augmented surveillance systems to pre-emptively arrest people who fit a predictive risk profile.

OpenAI is excited to start having this discussion with their peers, policymakers, and the general public; they’ve spent the last two years researching and solidifying our internal policies at OpenAI and are going to begin engaging a wider audience on these issues.

They’re especially keen to work with more researchers that see themselves contributing to the policy debates around AI as well as making research breakthroughs.

Related: 8 Fundamentals for Achieving Artificial Intelligence Success in the Supply Chain

Related White Papers

Download the Paper

8 Keys to Achieving Success with Artificial Intelligence in Supply Chain
This white paper looks at the fundamentals that supply chains need in place in order to achieve real results from Artificial Intelligence implementations. Download Now!


Download the Paper

Can Blockchain Revolutionize the Supply Chain?
In this white paper Ranjit Notani, One Network CTO examines Blockchain’s powerful potential as well as a major problem and whether and how Blockchains can revolutionize the Supply Chain. Download Now!


Download the Paper

The Internet of Things and Your Supply Chain
This white paper offers a quick and clear guide to the Internet of Things (IoT), it explains why this technology is so exciting for supply chain and offers a few examples of how it and related technology can be used to dramatically cut costs. Download Now!


Article Topics


One Network Enterprises News & Resources

Blue Yonder announces an agreement to acquire One Network Enterprises for $839 million
Blue Yonder Acquires One Network Enterprises for $839M
Companies Need to Develop New Innovative Approaches to Supply Chain Design
How to Improve Cost of Goods Sold Horizontally Across the Supply Chain
How the Global Pandemic Accelerated Supply Chain Visibility, Digitalization, and Automation
AI and Data, the Future of Supply Chain Management
AI and Supply Chain Problem Solving
More One Network Enterprises

Latest in Technology

Spotlight Startup: Cart.com
Walmart and Swisslog Expand Partnership with New Texas Facility
Taking Stock of Today’s Robotics Market and What the Future Holds
Biden Gives Samsung $6.4 Billion For Texas Semiconductor Plants
Apple Overtaken as World’s Largest Phone Seller
Walmart Unleashes Autonomous Lift Trucks at Four High-Tech DCs
Talking Supply Chain: Procurement and the AI revolution
More Technology

One Network’s Real Time Value Network™ provides community based supply chain solutions in the cloud to help customers increase profitability and efficiencies by optimizing their supply chain operations. Our software solutions enable customers to easily collaborate with all their value chain participants on a single network - customers, partners, carriers and suppliers.



View One Network Enterprises company profile

 

Featured Downloads

GEP Procurement & Supply Chain Tech Trends Report 2024
GEP Procurement & Supply Chain Tech Trends Report 2024
We’ve researched the five biggest trends in the supply chain space this year, and, drawing on our expertise in procurement and...
Unified Control System - Intelligent Warehouse Orchestration
Unified Control System - Intelligent Warehouse Orchestration
Download this whitepaper to learn Unified Control System (UCS), designed to orchestrate automated and human workflows across the warehouse, enabling automation technologies...

An Inside Look at Dropshipping
An Inside Look at Dropshipping
Korber Supply Chain’s introduction to the world of dropshipping. While dropshipping is not for every retailer or distributor, it does provide...
C3 Solutions Major Trends for Yard and Dock Management in 2024
C3 Solutions Major Trends for Yard and Dock Management in 2024
What trends you should be focusing on in 2024 depends on how far you are on your yard and dock management journey. This...
Packsize on Demand Packing Solution for Furniture and Cabinetry Manufacturers
Packsize on Demand Packing Solution for Furniture and Cabinetry Manufacturers
In this industry guide, we’ll share some of the challenges manufacturers face and how a Right-Sized Packaging On Demand® solution can...