The Language of Deception Weaponizing Next Generation AI

A penetrating look at the dark side of emerging AI technologies In The Language of Deception: Weaponizing Next Generation AI, artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for m...

Descripción completa

Detalles Bibliográficos
Otros Autores: Hutchens, Justin, author (author), McClure, Stuart, author
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, Inc [2024]
Edición:First edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009811323106719
Tabla de Contenidos:
  • Intro
  • Table of Contents
  • Title Page
  • Foreword
  • Introduction
  • Reader Support for This Book
  • Chapter 1: Artificial Social Intelligence
  • Positronic Man
  • Defining (Artificial) Social Intelligence
  • The Turing Test
  • The Semblance of Social Intelligence
  • The Question of Weaponization
  • Chapter 2: Social Engineering and Psychological Exploitation
  • The Roots of Social Engineering
  • Social Engineering and Psychology
  • Applied Social Engineering
  • One Principle to Rule Them
  • The Long Con
  • Loose Lips Sink Ships
  • The Takeaway
  • Chapter 3: A History of Technology and Social Engineering
  • Advertising
  • Propaganda
  • Cybercrime
  • The Rise of the Bots
  • The Worst Is Yet to Come
  • Chapter 4: A History of Language Modeling
  • Rule-Based NLP Systems
  • Statistical Language Models
  • Rule-Based vs. Statistical Models
  • Note
  • Chapter 5: Consciousness, Sentience, and Understanding
  • Mad as a Hatter
  • The Question of Consciousness
  • The Sentience Scare
  • Chapter 6: The Imitation Game
  • The Chinese Room
  • The Democratization of Machine Interaction
  • Emergent Properties
  • Reinforcement Learning from Human Feedback
  • Likeable Robots
  • The Illusion of Empathy
  • Chapter 7: Weaponizing Social Intelligence
  • Where's the Risk?
  • The Spontaneous and Organic Occurrence of Turing Tests
  • Bot or Not?â€"CAPTCHA Evasion
  • Creating the Illusion of Conversation
  • Context Crafting
  • Unleash the Bots
  • Conversational Relays with LLMs
  • Optimizing Social Engineering with Monte Carlo Simulations
  • Remaining under the Radar
  • The Impending AI Scourge
  • Notes
  • Chapter 8: Weaponizing Technical Intelligence
  • Unintended Technical Problems
  • Deliberate Technical Exploitation
  • Note
  • Chapter 9: Multimodal Manipulation
  • Converging on Transformers
  • Deepfake Imagery
  • Sociopolitical Destabilization.
  • Voice Synthesis and Duplication
  • Physical Robotics
  • The Takeaway
  • Chapter 10: The Future
  • Physical Embodiment
  • Inside the Echo Chamber
  • Artificial Super Intelligence
  • Singularity
  • Cognitive Integration (BCI)
  • Note
  • Chapter 11: The Quest for Resolution
  • Tactical Solutions
  • Stopping a Runaway Train
  • AI Risk Management
  • Global Partnership
  • Appendix A: Bot Automation
  • Browser Emulation
  • Browser Automation
  • Appendix B: LLM Pretext Engineering
  • Social Security Administration Proof of Concept
  • Credential Harvesting Proof of Concept
  • Wire Fraud Proof of Concept
  • Appendix C: CAPTCHA Bypass
  • Appendix D: Context Manipulation Attacks
  • Appendix E: Attack Optimization with Monte Carlo Simulations
  • Appendix F: Autonomous C2 Operations with LLMs
  • Appendix G: Disembodiment Attacks
  • Bibliography
  • Acknowledgments
  • About the Author
  • Index
  • Copyright
  • Dedication
  • End User License Agreement.