https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • Microwave/RF
    • T&D World
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookies Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Artificial Intelligence


Partner content

Why AIs will become hackers

Why AIs will become hackers

  • Written by Karen Spiegelman / Dark Reading
  • 10th June 2022

RSA CONFERENCE 2022 — San Francisco — “Nice to see you all again,” Bruce Schneier told the audience at his keynote for the in-person return of RSA Conference, taking off his trademark cap. “It’s kinda neat. Kinda a little scary.”

Schneier is a security technologist, researcher, and lecturer at Harvard Kennedy School. He has a long list of publications, including books from as early as 1993 and as recent as 2019’s We Have Root, with a new one launching in January 2023. But he’s best known for his long-running newsletter Crypto-Gram and blog Schneier on Security. And his upcoming book is about hacking.

To Schneier, hacking does not necessarily mean computer systems. “Think about the tax code,” he said. “It’s not computer code, but it’s code. It’s a series of algorithms with inputs and outputs.”

Because the tax code is a system, it can be hacked, Schneier said. “The tax code has vulnerabilities. We call them tax loopholes. The tax code has exploits. We call them tax avoidance strategies. And there’s an entire industry of black-hat hackers — we call them tax accountants and tax attorneys,” he added, to audience laughter.

He defined hacking as “a clever, unintended exploitation of a system, which subverts the rules of the system at the expense of some other part of the system.” He noted that any system can be hacked, from the tax code to professional hockey, where a player — it’s contested just who — started using a curved stick to improve their ability to lift the puck. That player hacked the hockey system.

“Even the best-thought-out sets of rules will be incomplete or inconsistent,” Schneier said. “It’ll have ambiguity. It’ll have things the designers haven’t thought of. And as long as there are people who want to subvert the goals of the system, there will be hacks.

“What I want to talk about here is what happens when AIs start hacking.”

Rise of the Machines

When AIs start hacking human systems, Schneier said, the impact will be something completely new.

“It won’t just be a difference in degree but a difference in kind, and it’ll culminate in AI systems hacking other AI systems and us humans being collateral damage,” he said, then paused. “So that’s a bit of hyperbole, probably my back-cover copy, but none of that requires any far-future science- fiction technology. I’m not postulating a singularity. I’m not assuming intelligent androids. I’m actually not even assuming evil intent on the part of anyone.

“The hacks I think about don’t even require major breakthroughs in AI. They’ll improve as AI gets more sophisticated, but we can see shadows of them in operation today. And the hacking will come naturally as AIs become more advanced in learning, understanding, and problem-solving.”

He traced the evolution of AI hackers using examples of competitions. Technically it’s the human developers who compete in events like DARPA’s 2016 Cyber Grand Challenge or China’s Robot Hacking Games, but the AIs operate autonomously once set into motion.

“We know how this goes, right?” he asked. “The AIs will improve in capability every year, and we humans stay about the same, and eventually the AIs surpass the humans.”

To read the complete article, visit Dark Reading.

 

 

Tags: Alerting Systems Analytics Applications Artificial Intelligence Critical Infrastructure Cybersecurity Enterprise Federal Government/Military Incident Command/Situational Awareness Interoperability News Public Safety Security Software State & Local Government System Operation Tracking, Monitoring & Control Partner content

Most Recent


  • Southern Linc official discusses MCPTT migration, interoperability with new partner Catalyst
    Southern Linc—the wireless-communications carrier that is subsidiary of the Southern Company electric utility—is nearing completion of its internal migration to LTE-only mission-critical-push-to-talk (MCPTT) and is preparing to implement the LMR-LTE interoperability solution of new partner Catalyst Communications throughout its network. Ritesh Desai, product engineering manager for Southern Linc, said that Southern Company workers use the […]
  • Why AIs will become hackers
    Newscan: NYPD’s bomb-sniffing dogs get a high-tech upgrade to keep city safe
    Web Roundup Items from other news organizations NYPD’s bomb-sniffing dogs get a high-tech upgrade to keep city safe Neighbors app usage grows among police, fire departments Allied cybersecurity agencies advise against disabling popular tool for cyberattakers Viasat shareholders approve Inmarsat acquisition Telecom players divided on Gigi Sohn’s FCC prospects as August recess looms Op-Ed: The […]
  • Chinese APT group likely using ransomware attacks as cover for IP theft
    A China-based advanced persistent threat (APT) actor, active since early 2021, appears to be using ransomware and double-extortion attacks as camouflage for systematic, government-sponsored cyberespionage and intellectual property theft. In all of the attacks, the threat actor has used a malware loader called the HUI Loader — associated exclusively with China-backed groups — to load […]
  • AT&T, Verizon, T-Mobile tout Z-axis support for 911
    The nation’s biggest wireless network operators told the FCC earlier this month that they are successfully securing Z-axis location data for 911 calls. That’s critical because the information can be combined with existing X- and Y-axis data in order to let emergency responders know exactly which floor a 911 caller in a skyscraper is located, […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • Australia’s chief scientist on enabling public trust in AI
  • Betacom seeks to simplify CBRS private-network solutions for enterprises
  • Artificial intelligence used to detect guns at schools
  • MITRE creates framework for supply-chain security

Commentary


LTE and liability: Why the fire service must move forward with digital incident command

  • 2
6th May 2022

Partnership and collaboration must be the foundation for emergency communications

18th April 2022

FirstNet success means no hypothetical ‘shots’ need to be fired, Swenson says

22nd February 2022
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


UrgentComm

Southern Linc official discusses MCPTT migration, interoperability with new partner Catalyst dlvr.it/SSr8VD

25th June 2022
UrgentComm

Newscan: NYPD’s bomb-sniffing dogs get a high-tech upgrade to keep city safe dlvr.it/SSpSD1

25th June 2022
UrgentComm

Chinese APT group likely using ransomware attacks as cover for IP theft dlvr.it/SSmJNm

24th June 2022
UrgentComm

AT&T, Verizon, T-Mobile tout Z-axis support for 911 dlvr.it/SSkGxK

23rd June 2022
UrgentComm

California grants first permit to test AVs using only Lidar sensing dlvr.it/SSkG7x

23rd June 2022
UrgentComm

Buying smart solutions: Technology is now part of (almost) every government purchase dlvr.it/SSk77q

23rd June 2022
UrgentComm

France preparing to launch public-safety broadband network, official says dlvr.it/SSh12p

23rd June 2022
UrgentComm

Newscan: Law-enforcement radios failed during Uvalde school mass shooting, Texas official says dlvr.it/SSf9vM

22nd June 2022

Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • Microwave/RF
  • T&D World
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookies Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X