{"id":15686,"date":"2024-02-17T12:46:14","date_gmt":"2024-02-17T12:46:14","guid":{"rendered":"https:\/\/shareperformanceinsight.com\/index.php\/2024\/02\/17\/ai-security-infrastructure-needed-after-malicious-foreign-actors-use-openai-to-train-operatives-expert-says\/"},"modified":"2024-02-17T12:46:14","modified_gmt":"2024-02-17T12:46:14","slug":"ai-security-infrastructure-needed-after-malicious-foreign-actors-use-openai-to-train-operatives-expert-says","status":"publish","type":"post","link":"https:\/\/shareperformanceinsight.com\/index.php\/2024\/02\/17\/ai-security-infrastructure-needed-after-malicious-foreign-actors-use-openai-to-train-operatives-expert-says\/","title":{"rendered":"AI security infrastructure needed after \u2018malicious\u2019 foreign actors use OpenAI to train operatives, expert says"},"content":{"rendered":"<div>\n<p class=\"speakable\">The U.S. will have to decide how openly it wants to allow public access to artificial intelligence (AI), potentially impacting overall data protection policies, after Microsoft revealed state actors from rival nations used the tech to train their operatives.\u00a0<\/p>\n<p class=\"speakable\">\u2018We\u2019re either going to have to decide whether we\u2019re going to keep these things open and easy to access for everybody, which means for bad and good actors, or we\u2019re going to take a different tack,\u2019 Phil Siegel, founder of the AI non-profit Center for Advanced Preparedness and Threat Response Simulation, told Fox News Digital.\u00a0<\/p>\n<p>OpenAI, in a blog post written Wednesday, identified five state-affiliated \u2018malicious\u2019 actors: Chinese-affiliated Charcoal Typhoon and Salmon Typhoon, Iranian-affiliated Crimson North Korean-affiliated Sandstorm and Russian-affiliated Emerald Sleet and Forest Blizzard.<\/p>\n<p>The post claimed the groups used OpenAI services to \u2018query open-source information, translate, find coding errors, and run basic coding tasks.\u2019 The two Chinese-affiliated groups, for example, allegedly translated technical papers, debugged code, generated scripts and looked at how to hide processes in different electronic systems.\u00a0<\/p>\n<p>In response, OpenAI proposed a multipronged approach to combating such malicious use of the company\u2019s tools, including \u2018monitoring and disrupting\u2019 malicious actors through new tech to identify and cut off actors\u2019 activities, greater cooperation with other AI platforms to catch malicious activity and improved public transparency.\u00a0<\/p>\n<p>\u2018As is the case with many other ecosystems, there are a handful of malicious actors that require sustained attention so that everyone else can continue to enjoy the benefits,\u2019 OpenAI wrote. \u2018Although we work to minimize potential misuse by such actors, we will not be able to stop every instance.\u2019<\/p>\n<p>\u2018By continuing to innovate, investigate, collaborate, and share, we make it harder for malicious actors to remain undetected across the digital ecosystem and improve the experience for everyone else,\u2019 the company insisted.\u00a0<\/p>\n<p>Siegel argued that these gestures, while well-meaning, ultimately will not prove effective due to the lack of current infrastructure to allow them to have the necessary impact.\u00a0<\/p>\n<p>\u2018We\u2019re going to have to decide whether this is a fully open system \u2026 or are we going to have it be like the banking system where there\u2019s all these gates in the system that stop these things from happening,\u2019 Siegel said.\u00a0<\/p>\n<p>\u2018I am skeptical because the banks have a whole set of infrastructure and regulations behind them to make these things happen \u2026 and we don\u2019t have that yet,\u2019 he explained. \u2018We\u2019re thinking about it and working on it, but until that stuff is in place \u2013 this isn\u2019t Microsoft\u2019s fault or Open A\u2019s fault or Google\u2019s fault.\u2019<\/p>\n<p>\u2018We just have to move quickly to make sure that this stuff gets put in place so that they can know how they\u2019re going to implement these types of things,\u2019 he added.\u00a0<\/p>\n<p>Microsoft, in a separate blog post, argued for some additional measures \u2013 namely \u2018notification\u2019 for other AI service providers to help flag relevant activity and data so they can immediately act on the same users and processes.\u00a0<\/p>\n<p>Though \u2018complementary defenses,\u2019 Microsoft and OpenAI pledged to protect the valuable AI systems along with assistance from MITRE to develop countermeasures in the \u2018evolving landscape of AI-powered cyber operations.\u2019\u00a0<\/p>\n<p>\u2018The threat ecosystem over the last several years has revealed a consistent theme of threat actors following trends in technology in parallel with their defender counterparts,\u2019 Microsoft acknowledged.\u00a0<\/p>\n<p>Siegel suggested that the processes described would only account for some of the activity the malicious actors pursued \u2013 again, due to the lack of current systems in place to catch the full array of activity \u2013 since the hackers can use spycraft and even \u2018other forms of technology\u2019 to achieve their goals.\u00a0<\/p>\n<p>\u2018There\u2019s just work that has to be done, and I\u2019m skeptical that Microsoft\u2019s OpenAI can go and do that on their own without help from the government or other agencies that have already worked on technologies like that,\u2019 Siegel said.\u00a0<\/p>\n<p>The Department of Homeland Security did not respond to a Fox News Digital request for comment by the time of publication.\u00a0<\/p>\n\n<div>This post appeared first on FOX NEWS<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The U.S. will have to decide how openly it wants to allow public access to artificial intelligence (AI), potentially impacting overall data protection policies, after Microsoft revealed state actors from rival nations used the tech to train their operatives.\u00a0 \u2018We\u2019re either going to have to decide whether we\u2019re going to keep these things open and <\/p>\n","protected":false},"author":0,"featured_media":15687,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[25],"tags":[],"class_list":{"0":"post-15686","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-politics"},"_links":{"self":[{"href":"https:\/\/shareperformanceinsight.com\/index.php\/wp-json\/wp\/v2\/posts\/15686","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shareperformanceinsight.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shareperformanceinsight.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/shareperformanceinsight.com\/index.php\/wp-json\/wp\/v2\/comments?post=15686"}],"version-history":[{"count":0,"href":"https:\/\/shareperformanceinsight.com\/index.php\/wp-json\/wp\/v2\/posts\/15686\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shareperformanceinsight.com\/index.php\/wp-json\/wp\/v2\/media\/15687"}],"wp:attachment":[{"href":"https:\/\/shareperformanceinsight.com\/index.php\/wp-json\/wp\/v2\/media?parent=15686"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shareperformanceinsight.com\/index.php\/wp-json\/wp\/v2\/categories?post=15686"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shareperformanceinsight.com\/index.php\/wp-json\/wp\/v2\/tags?post=15686"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}