{"id":176234,"date":"2017-02-09T06:13:07","date_gmt":"2017-02-09T11:13:07","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/how-criminals-use-artificial-intelligence-and-machine-learning-betanews\/"},"modified":"2017-02-09T06:13:07","modified_gmt":"2017-02-09T11:13:07","slug":"how-criminals-use-artificial-intelligence-and-machine-learning-betanews","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence\/how-criminals-use-artificial-intelligence-and-machine-learning-betanews\/","title":{"rendered":"How criminals use Artificial Intelligence and Machine Learning &#8211; BetaNews"},"content":{"rendered":"<p><p>    It has become common practice for attackers to use Artificial    Intelligence (AI) and Machine Learning (ML) to link tools    together so that they can be run in parallel when conducting an    attack.  <\/p>\n<p>    Attackers use AI and ML to take the results from one tool and    then allow the other tools to \"learn\" about the finding and use    it against other systems. As an example, if a one tool finds a    password, that tool can feed the information to another tool or    bot that may conduct the exploitation of one or many systems    using the discovered password.  <\/p>\n<p>    AI and ML allows for an attacker to program a toolset or bot to    act like a \"real\" attacker. As an example, the tool or bot may    launch a phishing attack against an organization and then take    the results of the phishing tool and conduct other types of    attacks just as a human would.  <\/p>\n<p>    Attackers are building toolsets and bots that use AI and ML    techniques to evade detection and blocking the methods already    in place within most organizations. Many of these tools    (typically open source) can be easily obtained from the    Internet. This gives anyone the ability to run the tools    against target organizations.  <\/p>\n<p>    In an article in     Wired President Obama expressed his concerns about    AI-enabled bots attacking nuclear weapon silos and causing a    launch. This intimates that the threat of AI and ML enhanced    attacks are a major concern even at the highest level of    government.  <\/p>\n<p>    Advice and Recommendations  <\/p>\n<p>    Photo Credit: igor.stevanovic\/Shutterstock  <\/p>\n<p>    As the Chief    Information Officer of Digital Defense, Tom    DeSot is charged with developing and maintaining relationships    with key industry and market regulators; functioning as the    \"face of DDI\" through public speaking initiatives, identifying    key integration and service partnerships, and serving as the    prime regulatory compliance resource for external and internal    contacts. Tom also serves as the companys internal auditor on    security-related matters.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View original post here: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/betanews.com\/2017\/02\/08\/how-criminals-use-artificial-intelligence-and-machine-learning\/\" title=\"How criminals use Artificial Intelligence and Machine Learning - BetaNews\">How criminals use Artificial Intelligence and Machine Learning - BetaNews<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> It has become common practice for attackers to use Artificial Intelligence (AI) and Machine Learning (ML) to link tools together so that they can be run in parallel when conducting an attack. Attackers use AI and ML to take the results from one tool and then allow the other tools to \"learn\" about the finding and use it against other systems.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/artificial-intelligence\/how-criminals-use-artificial-intelligence-and-machine-learning-betanews\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187742],"tags":[],"class_list":["post-176234","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176234"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=176234"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176234\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=176234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=176234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=176234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}