0 21 min 1 mth

Mr. AI Cools selling info security services call it ethical and those prefer heck with utter rudeness are defined unethical. Both work for some goals – personal vandetta, capital gains or sponsored by colonial cronies looking to encash the overall vulnerability and create business opportunities or jugaad. Much like murdering someone either for a hefty supari or for satisfying greed of some cozy Urban Nazis. The broader implications for national security are also concerning.

The ability of foreign actors or even desi messiahs to exploit AI loopholes for espionage or sabotage poses a significant threat. Like other hyped menaces, AI correctness is a doctrine fostered by a delusional, illogical minority, and promoted by unscrupulous cronies within mainstream tech world which holds forth the proposition that it is entirely possible to pick up a looter’s turd by the clean end.

As AI hackers / unicorns are making money, the field is becoming full of humming professionals that inspire organized cyber crime, buying top legal jugaad. Taking clues from their corporate, political and social masters, smart techies have already developed their own business models in order to operate as a profitable organization. What do AI business models look like? More data, more money. So the attack logic is simple: the more invincible attacks, the more likely victim – so you automate. But interesting variations keeps emerging e.g. hackers do buy or steal white data from social media privacy traders like Metaverses, Fakebooks, Goolies, Flippers, Snapers, Aamass, Zohonskies etc.. and bang innocent naive users with deception via selfie updates, emails, texts, fake news or even direct mobile calls. This is also called win-win strategic partnership, done mostly in cool backdoor encounter of shrewd intellects!

Some scientists worry about people becoming confused by AI systems due to their use of human-like language (LLMs). This could push people to attribute human qualities to AI, resulting in emotional dependence and increased trust in its capabilities, making them more vulnerable to AI’s weaknesses in complex, risky situations for which the AI is only superficially modeled. Moreover, the constant interaction with AI systems might also make people gradually isolate themselves from human relationships, leading to psychological distress and a negative impact on their well-being.

An example: Master hackers (data suckers for AI) or great innovators writes phishing toolkit (an app, website or some AI stuff) for other worker hackers to use. The proxy suckers download the kit, chose a phishing site or mobile app using a simple GUI dashboard and, just like that, the proxy hackers were good to go. The popularity of the kit soars, since, as opposed to traditional phishing setups where hackers are required to set up and allocate storage for AI data collection, this kit offer to remove that back-office work from the proxy hacker. The master hacker provide with its kit cloud storage for the fraudulently obtained credentials. The credentials, once retrieved, would go to the cloud storage and reside in a location allocated only for the single proxy suckers. AI Controls were set such that one proxy hacker could not access the allocation area of another proxy hacker.

The proxy hackers could continue with their attacks without ever worrying about being cheated out by a fellow hacker. But this toolkit had a twist: although access to the credentials storage was secured from the eyes of fellow proxy hackers, this was not the case with the master sucker. A backdoor on the storage system allowed the viewing of all these credentials by the master hacker who wrote the kit. In reality then, all the MLM proxy hackers were each gathering the credentials for the master hacker!

Now consider the scenario – assume each proxy hacker gains a dozen credentials. And a thousand hackers have downloaded the kit – that’s already over 10K worth of AI data without the master hacker ever needing to dirty his hands with the actual target! In fact, the master hacker boasted some 200K downloads. This number may surely be exaggerated, but the point is clear – it is widely in use. In India, it’s also done via innovative network / विकसित online marketing storing server data out of country!

Potential for disruption increases as AI become more integrated into healthcare, media, education, finance, and government services. Like any successful loot driven business model, it is not enough to just advertise. To really penetrate the market, you need to show you know your stuff. AI Hackers are abusing organized social / mainstream media as a channel to promote their skills. As traditional mafia / terror games gets less lucrative, tutorials on hacks are getting common, and the tech biggies love it anyway as it creates new prospects to counter-sell their anti-hacking kits. A new playschool rhyme “hacker, hacker, uncle AI rule breaker – hacker, hacker, the great quick money maker, thou privacy trader!”.

Beyond internal breaches, there is prospect of AI systems compromised to deliver misinformation. Potential for AI to be weaponized is well-know, risks are manifold and growing from manipulating training data to exploiting software bugs. AI can generate and disseminate fake news, nazify masses, influence public opinion, and sway election outcomes. The ability to rewrite history, influence voters, or subtly alter public perception is no longer some science fiction. It’s an alien reality we must confront before mass-annihilated.

The विकसित AI models designed (Shrinking, throttling and piggybacking the real innovation: Internet Backbone) to enhance productivity and innovation are just fancy instruments of disruption, division and chaos. As we continue to integrate AI into our lives, the issue remains: How do you encourage innovation while protecting users and unwitting developers from misuse, either accidental or with more sinister intentions?

In theory; emails, SMS and chats are encrypted in transit. So, don’t worry about random third parties of 1G to 9G scanning your data in transit? In practice however; Gmail, Zoho, GoDaddy, Android, iOS, Amazon, your ISP, Smart Apps or whatever can decrypt / mine all your data for all sorts of predictions. Craze of GenAI Models are due to stealth capabilities for live scanning data to profile each human DNA on a global scale.. AI cognitive neuroscience is also applied to your contact lists / family / recipients network staring the mobile screen 24/7!

Leave a Reply