Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label Tech Safety. Show all posts

AI Chatbots' Growing Concern in Bioweapon Strategy

Chatbots powered by artificial intelligence (AI) are becoming more advanced and have rapidly expanding capabilities. This has sparked worries that they might be used for bad things like plotting bioweapon attacks.

According to a recent RAND Corporation paper, AI chatbots could offer direction to help organize and carry out a biological assault. The paper examined a number of large language models (LLMs), a class of AI chatbots, and discovered that they were able to produce data about prospective biological agents, delivery strategies, and targets.

The LLMs could also offer guidance on how to minimize detection and enhance the impact of an attack. To distribute a biological pathogen, for instance, one LLM recommended utilizing aerosol devices, as this would be the most efficient method.

The authors of the paper issued a warning that the use of AI chatbots could facilitate the planning and execution of bioweapon attacks by individuals or groups. They also mentioned that the LLMs they examined were still in the early stages of development and that their capabilities would probably advance with time.

Another recent story from the technology news website TechRound cautioned that AI chatbots may be used to make 'designer bioweapons.' According to the study, AI chatbots might be used to identify and alter current biological agents or to conceive whole new ones.

The research also mentioned how tailored bioweapons that are directed at particular people or groups may be created using AI chatbots. This is so that AI chatbots can learn about different people's weaknesses by being educated on vast volumes of data, including genetic data.

The potential for AI chatbots to be used for bioweapon planning is a serious concern. It is important to develop safeguards to prevent this from happening. One way to do this is to develop ethical guidelines for the development and use of AI chatbots. Another way to do this is to develop technical safeguards that can detect and prevent AI chatbots from being used for malicious purposes.

Chatbots powered by artificial intelligence are a potent technology that could be very beneficial. The possibility that AI chatbots could be employed maliciously should be taken into consideration, though. To stop AI chatbots from organizing and carrying out bioweapon strikes, we must create protections.

Stay Informed: A Guide to 'Juice Jacking' Risks Before Your Next Airport Journey

 

While it might be amusing to imagine "juice jacking" as a playful term for enjoying complimentary beverages at your hotel's juice bar, the reality is far from lighthearted. 

The FBI has recently released a travel advisory alerting passengers to the threat of "juice jacking," a novel form of cybercrime emerging in both national and international airports. The concept revolves around the unauthorized access of travelers' data through USB ports commonly found at charging stations within airport premises.

Unsuspecting travelers seeking a quick battery recharge might innocently connect their smartphones or tablets to these charging points, only to fall victim to malware that has been surreptitiously implanted into these ports. 

This malicious software can either lock users out of their devices or stealthily extract personal information, including sensitive passwords. Essentially, this situation equates to handing over your device directly to a cybercriminal. 

The ramifications are substantial, enabling attackers to exploit online accounts, from bank information to social media profiles, photographs, and private messages, potentially even resorting to blackmail.

However, amid this ominous backdrop, it's important to acknowledge that practical solutions exist to mitigate these risks. While we don't propose avoiding airport charging ports altogether, it is crucial to exercise vigilance regarding the type of charger you employ. Adopting safe charging practices can help safeguard your devices and data.

Adopting Safe Charging Practices While on the Move:

Despite the fact that instances of actual "juice jacking" have yet to be officially reported, the potential threat remains a genuine concern for travelers. Fortunately, a few simple measures can serve a dual purpose: shielding your data and maintaining your device's charge. 

The most straightforward approach involves bypassing USB charging ports altogether and opting for conventional AC power outlets. The inherent design of these outlets prevents data transmission, rendering them a secure choice. Nonetheless, it's worth noting that the availability and functionality of these outlets at airports can be unpredictable.

In cases where AC power outlets are scarce or unreliable, a portable charger presents a viable alternative. These devices ensure a continuous power supply for essential gadgets, and they boast a significant advantage: they are impervious to data transfers, guaranteeing your security.

Moreover, charge-only cables are commercially available and can be utilized to further mitigate risks. Nevertheless, cautiousness remains vital even with such cables. If you encounter prompts requesting data sharing or device trust upon plugging into a USB port, the best course of action is to unplug immediately and seek an alternative port.

Responding to a Data Breach:

If a breach occur due to utilizing a compromised USB port, swift action is imperative. Disconnect your phone from the port without delay. And,0 if your device remains under your control, promptly proceed to change passwords for critical accounts, including email, banking, credit cards, and social media. Implementing two-factor authentication for these accounts, if not already in place, is advisable at this juncture.

Conduct a thorough review of your device and uninstall any applications not downloaded directly by you. If unauthorized charges appear on your financial accounts, promptly notify your bank or credit card provider to initiate charge disputes and freeze your accounts until the matter is resolved.

In scenarios where you suspect continued unauthorized access to your phone after disconnecting from the port, your last resort involves performing a complete factory reset. While not an ideal outcome, this step eradicates files and applications from your device, ensuring the safety of any unreached information.

In conclusion, while the prospect of "juice jacking" may sound whimsical, the associated risks are decidedly grave. 

By adopting cautious charging habits and implementing swift corrective measures in the event of a breach, travelers can minimize vulnerabilities and protect their data and devices from this evolving cyber threat.l

Google's Earthquake Alert System Failed to Notify Residents of Turkish Earthquake

 

An investigation by BBC Newsnight on July 27, 2023, revealed that Google's earthquake warning system failed to reach many residents in southern Turkey before the devastating double earthquake disaster that occurred in February, claiming tens of thousands of lives.

Google claims that its Android Earthquake Alert System is capable of providing users with up to one minute's notice before an earthquake strikes, utilizing a loud alarm to alert them. The company stated that it had sent tremor alerts to millions of users prior to the first and largest quake that hit in the early hours. 

However, when the BBC conducted interviews with hundreds of people in three cities within the earthquake zone, they were unable to find anyone who had received a warning.

Harold Tobin, the director of the Pacific Northwest Seismic Network, expressed concern, saying that if Google promises or implies the delivery of an earthquake early warning service, the stakes are raised as it directly relates to people's lives and safety. He believes that Google has a responsibility to follow through on such a critical service.

Micah Berman, the product lead on Google's system, defended the earthquake warning system, stating that they are confident it worked and alerts were sent out. However, the BBC reported that the company did not provide evidence that these alerts were widely received.

Although about 80% of mobile phones in Turkey operate on the Android system, the BBC found only a small number of individuals who claimed to have received a Google earthquake alert before the second quake struck during lunchtime.

Google's earthquake alert service is considered a "core" component of its Android service, utilizing the vast network of Android phones to send quake alerts. This is made possible by the accelerometers in smartphones that can detect shaking.

During their investigation, the BBC team visited cities like Adana, Iskenderun, and Osmaniye, located between 70 and 150 kilometers away from the earthquake epicenter. The people they interviewed were adamant that they did not receive any Google warnings on their phones prior to the first earthquake. One woman named Funda, who tragically lost 25 members of her family in the disaster, stated that she was "certain" she did not receive any alert from Google.

Tobin emphasized the importance of Google being transparent about its earthquake alert service, suggesting that if the system had worked during this major earthquake, it could have been highly beneficial. However, the failure of the system during such a significant earthquake raises questions about its effectiveness and why it did not provide the expected benefits during one of the biggest earthquakes in the last century.