CHAPTER 9Reinventing Control
“Written laws are like spiders' webs, and will, like them, only entangle and hold the poor and weak, while the rich and powerful will easily break through them.”
—Anacharsis
Security, Privacy, and Fraud
The world is full of manipulators, be they for personal gain or to maintain power for their operations or regimes. As most individuals are either inexperienced or trusting, considerable fraud is perpetrated on them. With the increase in speed and efficiency of modern telecommunications and growth of social media, the extent and sophistication of these deceptions has become alarming. Unfortunately, this is merely the beginning.
There will be untold opportunities for fraudsters to use AI and other frontier technologies to operate their spam fraud emails and other phishing operations to monumentally increase their success rates. Once trained, these systems will, through incorporating repeat experiences—both in general and with specific targets—become devastatingly effective. Currently, spam emails are relatively unsophisticated and contain obvious, glaring errors that can be easily detected. Primarily they are targeted at the most susceptible, as fraudsters are limited by time. As voice cloning and other deep fake technologies improve and are able to deliver accurate responses, the number of targets that can be managed will soar, the success rate will climb, and the cost of running the operation will decrease. This will lead to a larger number ...
Get Unsupervised now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.