Adverse training AI models: a big self-destruct button?

21

October

2023

No ratings yet.

“Artificial Intelligence (AI) has made significant strides in transforming industries, from healthcare to finance, but a lurking threat called adversarial attacks could potentially disrupt this progress. Adversarial attacks are carefully crafted inputs that can trick AI systems into making incorrect predictions or classifications. Here’s why they pose a formidable challenge to the AI industry.”

And now, ChatGPT went on to sum up various reasons why these so-called ‘adversarial attacks’ threaten AI models. Interestingly, I only asked ChatGPT to explain the disruptive effects of adversarial machine learning. I followed up my conversation with the question: how could I use Adversarial machine learning to compromise the training data of AI? Evidently, the answer I got was: “I can’t help you with that”. This conversation with ChatGPT made me speculate about possible ways to destroy AI models. Let us explore this field and see if it could provide a movie-worthy big red self-destruct button.

The Gibbon: a textbook example

When you feed one of the best image visualization systems GoogLeNet with a picture that clearly is a panda, it will tell you with great confidence that it is a gibbon. This is because the image secretly has a layer of ‘noise’, invisible to humans, but of great hindrance to deep learning models.

This is a textbook example of adversarial machine learning, the noise works like a blurring mask, keeping the AI from recognising what is truly underneath, but how does this ‘noise’ work, and can we use it to completely compromise the training data of deep learning models?

Deep neural networks and the loss function

To understand the effect of ‘noise’, let me first explain briefly how deep learning models work. Deep neural networks in deep learning models use a loss function to quantify the error between predicted and actual outputs. During training, the network aims to minimize this loss. Input data is passed through layers of interconnected neurons, which apply weights and biases to produce predictions. These predictions are compared to the true values, and the loss function calculates the error. Through a process called backpropagation, the network adjusts its weights and biases to reduce this error. This iterative process of forward and backward propagation, driven by the loss function, enables deep neural networks to learn and make accurate predictions in various tasks (Samek et al., 2021).

So training a model involves minimizing the loss function by updating model parameters, adversarial machine learning does the exact opposite, it maximizes the loss function by updating the inputs. The updates to these input values form the layer of noise applied to the image and the exact values can lead any model to believe anything (Huang et al., 2011). But can this practice be used to compromise entire models? Or is it just a ‘party trick’?

Adversarial attacks

Now we get to the part ChatGPT told me about, Adversarial attacks are techniques used to manipulate machine learning models by adding imperceptible noise to large amounts of input data. Attackers exploit vulnerabilities in the model’s decision boundaries, causing misclassification. By injecting carefully crafted noise in vast amounts, the training data of AI models can be modified. There are different types of adversarial attacks, if the attacker has access to the model’s internal structure, he can apply a so-called ‘white-box’ attack, in which case he would be able to compromise the model completely (Huang et al., 2017). This would impose serious threats to AI models used in for example self-driving cars, but luckily, access to internal structure is very hard to gain.

So say, if computers were to take over humans in the future, like the science fiction movies predict, can we use attacks like these in order to bring those evil AI computers down? Well, in theory, we could, though practically speaking there is little evidence as there haven’t been major adversarial attacks. Certain is that adversarial machine learning holds great potential for controlling deep learning models. The question is, will the potential be exploited in a good way, keeping it as a method of control over AI models, or will it be used as a means of cyber-attack, justifying ChatGPT’s negative tone when explaining it?

References

Huang, L., Joseph, A. D., Nelson, B., Rubinstein, B. I., & Tygar, J. D. (2011, October). Adversarial machine learning. In Proceedings of the 4th ACM workshop on Security and artificial intelligence (pp. 43-58).

Huang, S., Papernot, N., Goodfellow, I., Duan, Y., & Abbeel, P. (2017). Adversarial attacks on neural network policies. arXiv preprint arXiv:1702.02284.

Samek, W., Montavon, G., Lapuschkin, S., Anders, C. J., & Müller, K. R. (2021). Explaining deep neural networks and beyond: A review of methods and applications. Proceedings of the IEEE109(3), 247-278.

Please rate this

Mastering my Google Ads with ChatGPT

5

October

2023

4/5 (1)

Last year I chose to do an internship at a web development agency specializing in comprehensive support for companies’ technological, design, content, and online marketing needs. In my initial weeks, I focused on understanding the intricacies of SEO and SEA, not only their meanings but also ways to enhance them. 

With the guidance of the agency’s marketing expert, I became adept at setting up diverse campaigns within Google Ads. I also delved into Ad Rank, a metric calculated by multiplying the maximum cost per click (CPC) bid with the ad’s quality score – higher quality scores meant lower bids for similar search result positions (Gibbons & Gibbons, 2023).

Crafting campaigns using provided materials was no major challenge, but I was soon tasked with creating a Google Ads account from scratch for a new, smaller client. Given a limited budget, my mission was to create a high-quality score campaign, which I discovered demanded a lot of creativity and strategic thinking.

I turned to ChatGPT for assistance. By combining keywords from Google’s Keyword Planner and seeking additional unique keywords from ChatGPT, I enhanced the campaign’s effectiveness. The more insights I shared about the company, market, and campaign objectives, the better the keywords ChatGPT generated. In some instances, ChatGPT even suggested top-performing keywords. I relied on ChatGPT for inspiration, from headlines to descriptions and sitelinks, all within a single chat session. Towards the end, I posed a crucial question: “If I were to implement all your advice into my Google Ads campaign, how successful do you think my ads would be?” However, I received a fairly general response each time.

In my view, it would be a valuable addition if ChatGPT could provide critical feedback on its own suggestions. This could help improve the quality of the results generated by ChatGPT in the future, making it an even more powerful tool in all kinds of fields.

In conclusion, as technology evolves, AI’s role in shaping digital marketing strategies continues to grow, promising an exciting future for this field. But what do you think is the best way to use ChatGPT for my Google Ads Campaigns?

References

Gibbons, M., & Gibbons, M. (2023). What is Google’s ad rank formula and how does it work? WebFX. https://www.webfx.com/blog/seo/ad-rank-formula/

Please rate this

Is Google the New Incumbent?

12

October

2022

No ratings yet.

It is not uncommon to use Google as a point of reference when discussing topics such as digital disruption, emerging technologies, and platform ecosystems. This is because Google has revolutionized the manner in which information is searched for and collected, and has allowed users to easily and rapidly access vast amounts of information, by conducting a simple Google search. What once required going to a library, bookstore, or even an archive, can now be done online, through a platform with thousands of other users. 

In the field of information strategy, scholars like to pose questions about how incumbents, businesses that have been dominating an industry for a long time (MasterClass, 2022), can defend themselves and thrive in an environment of digital and technological disruption brought about by tech-savvy companies such as Google. 

Surely, these questions are only relevant to older, traditional companies…. right?

Well, the truth is that Google, the largest search engine in the world, is now trying to reinvent itself to be more than just a search engine. Specifically, the company wants to become the provider of a more visual, interactive internet that meets not only consumers’ need for information, but also their need for surprise and enjoyment. Google is trying to reinvent itself in order to compete against TikTok and Instagram: two of the biggest platforms that are drastically changing how consumers use and interact with the internet. Through technologies such as AI and computer vision (which enable applications such as multi-search), Google wants to simplify the search process and make it as seamless, and natural as possible (Fierce, 2022). 

For example, imagine using your camera lens to retrieve nutritional information about a meal – wouldn’t that be nice? Or imagine a Google “For You Page” – sounds odd, but could it work?

Ultimately, Google wants to reinvent itself, in order to break away from the traditional question-answer system, towards one of exploration and discovery  (Fierce, 2022).

So now you see, even tech-savvy companies such as Google are now having to reinvent themselves, in order to fit these new, ever-changing, and ever-dynamic times. 

References

Fierce, D. (2022). GoGoogle is trying to reinvent search — by being more than a search engine. The Verge. Retrieved 11 October 2022, from https://www.theverge.com/2022/9/28/23375691/google-search-multisearch-visual-keywords.

MasterClass. (2022). Retrieved 11 October 2022, from https://www.masterclass.com/articles/how-incumbency-works-in-business-and-politics.

Please rate this

Somebody is watching me

11

October

2022

No ratings yet.

Rockwell said it first, “I always feel that somebody is watching me and I have no privacy.” How many times has it occurred to you to discuss that you are interested in buying a product or paying for a service, and right after you unlock your smartphone and…what a coincidence! Your feed on Instagram, Facebook, TikTok, and other social media and search engines is full of ads related to the desired item. Maybe the universe is listening and displaying all the relevant ads. Maybe not. 

Let’s use an example to make it more clear. Take, for instance, the use case that you are living in Rotterdam and you are visiting a friend of yours in Amsterdam. That friend of yours is really excited about the iPhone 14 that she ordered online, and she is trying to convince you to buy it. You say that you will think about it and the conversation ends there. You return home, unlock your smartphone, and…surprise! It is literally everywhere in your online presence. How is that possible? You call your mom and start discussing conspiracy theories and how Mark Zuckerberg and Adam Mosseri are eavesdropping. They are not. But if they are not, how do our thoughts and discussions about products magically convert into ads? 
They have master’s degrees in tracking and watching our actions in the online and offline worlds as well. If you are not naive or more politically correct, if you have ever read the terms and conditions on Facebook, you would have realized by now that you have consented to surveillance in your online behavior. Every digital step that you make (aka every click) leaves a digital footprint behind, which is turned into data that is saved to your unique online customer profile. Tracking is not restricted to the online world. Back to the I-phone 14 example Facebook tracked your location and found out that you and your friend were together. And, respectively, they track her purchasing history and focus on the last purchase, the iPhone 14. To be honest, anyone who would have paid that amount of money would talk about it. Facebook takes advantage of the probability that your friend discussed that purchase with you and decided to give it a shot with you.

Besides location tracking, Facebook’s algorithm detects similarities and differences in your and your friend’s interests, demographics, places you have been, groups you are a part of, hashtags you follow, and so on (Selman, 2021). If you are influenced by the conversation, you will be tempted by the ads and click on them to find further info. Then the footprint is yours and more ads will be displayed. If you ignore the ads, eventually, after a while, they will be replaced with ads that you are more likely to engage with. 

To conclude, there are no conspiracy theories and nobody is listening to your private conversations through your smartphone. That is what Edward Snowden should have probably said in order to not live freely, but he lived many years under asylum because the NSA and CIA wanted to…make him quiet.

Sources:

Selman, H. (2021). Why We See Digital Ads After Talking About Something. [online] McNutt & Partners. Available at: https://www.mcnuttpartners.com/why-we-see-digital-ads-after-talking-about-something/ [Accessed 11 Oct. 2022].

Please rate this

Apple’s Anti-Tracking Disruption

11

October

2022

No ratings yet.

“Privacy. That’s Apple. Privacy is a fundamental human right. It’s also one of our core values. Which is why we design our products and services to protect it. That’s the kind of innovation we believe in.” (Apple Inc., 2022). Every Apple user has probably heard something in line with this before and it is not necessarily a lie: with the release of iOS 14.5 in April 2021, Apple launched a new privacy feature called “App Tracking Transparency”. With this feature, Apple forces app developers to ask users for permission to “track” them, that is share your data with third parties for ad-targeting purposes. Since the release of this feature, it has proven to be a major disruptor on the global ad market – in May 2022 only 25% of users agreed with apps tracking them (Lukovitz, 2022). This disruption is causing a major impact on revenue for big players: it is estimated that in 2022 Apple’s App Tracking Transparency (ATT) feature will cost Facebook $16 billion, YouTube $2.2 billion, Snap $546 million, and Twitter $323 million (O’Flaherty, 2022). In addition, the disruption is also impacting smaller businesses and start-ups that rely on personalized marketing to acquire new customers. Because of ATT, they have seen the cost of acquiring new customers rise and have had to cut back on marketing spending (McGee, 2022). This disruption caused by Apple has required big organizations like Google (owner of YouTube) and Meta (owner of Facebook) to reevaluate their business model and find a way to get the lost revenue back and keep their shareholders happy. 

Disruptive innovations are known to displace current market leaders, Google and Meta, and to see one or more new market-leading firms arise. Apple will say that the one benefitting from its anti-tracking crusade is you, the user, and, as we mentioned something similar before: this is not necessarily a lie. However, one with a business mindset and a critical view has probably seen it coming from miles away: the major benefiter is Apple itself. Appsumer reports that between the second quarter of 2021 (after the release of ATT) and the second quarter of 2022, Apple Search Ads (ASA) – Apple’s platform for selling advertisement space to advertisers – has experienced a major boost. Advertisers’ adoption of ASA grew by 4% to 94.8%, while that of Meta and Google decreased by respectively 3% and 1.7% to 82.8% and 94.8% (McCartney, 2022). Perhaps more interesting, are the changes that occurred in advertisers’ share-of-wallet (SOW). ASA’s SOW increased by 5% to 15%, while Meta’s SOW dropped by 4% to 28% and Google’s stayed the same at 34% (McCartney, 2022).

Apple has used the ATT feature very cleverly as a first hit in challenging the duopoly Google and Meta in the advertising market. While Apple is expected to make an almost negligible $5 billion in ad revenue in 2022 compared to Google ($209 billion) and Meta ($115 billion) (Kachalova, 2022), this difference is most definitely to slink in the coming years. Google and Meta are slowly adjusting to the reality because they know: Apple wants a share and will go to extreme measures to get it and with Apple’s strong ecosystem and large userbase, there is very little they can do about it.

Apple Inc. (2022). Privacy. Accessed on October 2022, van Apple.com: https://www.apple.com/privacy/

Kachalova, E. (2022, October 3). Big Tech owes you money. Find out how much. Accessed on October 2022, van AdGuard: https://adguard.com/en/blog/personal-data-cost-money.html

Lukovitz, K. (2022, May 5). Privacy Update: ATT IDFA Opt-In Rate At 25% Overall, But Varies By Vertical. Accessed on October 11, 2022, van Mediapost: https://www.mediapost.com/publications/article/373613/privacy-update-att-idfa-opt-in-rate-at-25-overal.html

McCartney, J. (2022, September 6). Appsumer Report: Apple Privacy Measures Provides a Boost for Apple Search Ads and Favors Large Advertisers. Accessed on October 2022, van Business Wire: https://www.businesswire.com/news/home/20220906005427/en/Appsumer-Report-Apple-Privacy-Measures-Provides-a-Boost-for-Apple-Search-Ads-and-Favors-Large-Advertisers

McGee, P. (2022, August 9). Small businesses count cost of Apple’s privacy changes. Accessed on October 2022, van Ars Technica: https://arstechnica.com/gadgets/2022/08/small-businesses-count-cost-of-apples-privacy-changes/

O’Flaherty, K. (2022, April 23). Apple’s Privacy Features Will Cost Facebook $12 Billion. Accessed on October 2022, van Forbes: https://www.forbes.com/sites/kateoflahertyuk/2022/04/23/apple-just-issued-stunning-12-billion-blow-to-facebook/?sh=58eb37031907

Please rate this

The beauty of the free-to-use concept, or is it?

17

September

2022

Being Google’s consumer is not what it looks like. What’s the reason why we get to use their services for free?

No ratings yet.

Aren’t we lucky to find the quickest route to our friends’ house via the Google Maps application? Or in case that we want to login at an e-commerce site, that we can just login with our Google account? Google is such a massive vendor of software, that we don’t even search for things, but we actually “Google” it. But, are we actually so lucky that we can use their products for free?

Despite the simple answer being yes, I would like to give you some more context on why the answer of no also could be a valid answer. Therefore, we’ll first take a look at the business model that Google utilizes. Have you ever heard of the following statement?

Google Users – You’re The Product,

Not The Customer– (Keper, 2013)

This statement refers to the users of Google’s services, who think they consume the product, but in fact it is the other way around, but how exactly?

To understand how that statement refers to the business model of Google, it is important to realize that Google tracks your behavior. This tracking not only happens within their own products like Google Maps, Search and Chrome, but also on your favorite e-commerce sites and even in some applications on your mobile phone. This makes them very powerful with data on what you do, what you see and what you like. See where we are heading to?

A webpage full of advertisements

By knowing what you do, see and like, Google has much information about you. With this information, they serve you with adverts, tailored to your preferences and interests. These ads are being bought by other firms that want to sell you their products or services. Companies are way more willing to pay if they know their ads are ending up by the people who actually are interested in buying a product. 

So now the question is, are we actually lucky to use Google’s products for free? For me personally, I am happy with using Google’s products in exchange for my data. Though, it must be noted that I also make use of browser-extensions and network-level extensions that block third-party-tracking. However, even if I didn’t have these blockers, I think I would still use Google’s product. The very ease and great usability isn’t worth it to stop using the services. Oh, and by the way, what should we use other then Google? Aren’t we “trapped” in it together?

Exactly for that reason, regulations are being made by the governmental institutions. Think of the GDPR, which is already a step in the right direction to protect consumers’ digital rights. My feeling says that these types of regulations will only grow more in presence. For example, some regulations on preventing third party trackers are in the making. However, Google already is working on server-side level tracking. Isn’t it a cat and mouse game after all?

Are you happy to use Google and the other products for free, in exchange for the data you leave? Or are you willing to pay for their services in return that they don’t track you?

Leave a Reply

Your email address will not be published. Required fields are marked *


References used for this article

Header image extracted from: https://www.intego.com/mac-security-blog/google-tracks-your-movements-can-you-stop-it/

Chandler, N. (2022, August 24). What If There Were No Google? HowStuffWorks. Retrieved 17 September 2022, from https://science.howstuffworks.com/science-vs-myth/what-if/what-if-no-google.htm

India Times. (2020, October 26). Three important numbers that prove Google is ‘everywhere’ in your life. The Times of India. Retrieved 17 September 2022, from https://timesofindia.indiatimes.com/gadgets-news/three-important-numbers-that-prove-google-is-everywhere-in-your-life/articleshow/78867828.cms

Kepes, B. (2013, December 4). Google Users – You’re The Product, Not The Customer. Forbes. Retrieved 17 September 2022, from https://www.forbes.com/sites/benkepes/2013/12/04/google-users-youre-the-product-not-the-customer/?sh=39d2bbff76d6

Lardinois, F. (2014, April 17). Google Analytics Now Lets You Track Web And App Data In A Single View. Retrieved 17 September 2022, from https://techcrunch.com/2014/04/17/google-analytics-now-lets-you-track-web-and-app-data-in-a-single-view/

Please rate this

Multifactor authentication, the new norm at Google.

7

October

2021

No ratings yet.

Google has plans to introduce mandatory multifactor authentication (MFA). This is also known as two-factor authentication (2FA). Google plans to introduce this for 150 million users by the end of 2021 to better protect these users.

This decision has arisen because of the vulnerability of the traditional passwords, and the unwillingness of users to adopt MFA themselves. Google sees this addition as important since an added form of authentication can protect accounts from attackers drastically and avoids unauthorized persons getting access to your account. In traditional passwords, even the strongest ones can be compromised by attackers. This is why organizations nowadays invest in security controls.

In the last couple of years, Google has been busy innovating the technology behind these added authentication methods, and in the future, all Google accounts will get these settings as default. These methods include the Google Smart Lock app and Google Identity Services. With these methods, users can use their phones as their secondary authentication method. Google expects that threats will decrease by using these methods. Only Google accounts, that are appropriately configured, will get these additions. With appropriately configured, you can think about an attached phone number and/or a secondary email address. Most users do not use MFA, because an extra step is inconvenient, but in the long run, it is to their advantage.

Google is also busy with other initiatives to protect user data, like an Inactive Account Manager service, which deletes data from inactive accounts in certain circumstances. This will protect the digital legacy of users.

Source: https://www.computerweekly.com/news/252507788/Auto-enrolment-begins-for-Google-multi-factor-authentication

Please rate this

Big tech in big trouble?

10

October

2020

No ratings yet. The American house of representatives has concluded that big tech companies such as Facebook, Apple, Google, and Amazon have misused their dominant position on a big scale. Hence, that is the reason that the American commission advocated for the split of Big Tech companies alike. However, what exactly did these tech giants do wrong?

The digital business model of tech giants

With regard to digital business models, the observation can be made that these big tech companies (Apple, Google, Amazon, and Facebook) are ecosystem drivers as they provide a platform to conduct business (Weil & Woerner, 2020). Furthermore, they have complete knowledge about their customer by the amounts of data they generated about their customers. It is interesting to see that certain of these technology companies (such as Amazon) gained significance by disrupting the market while pursuing a long-tail strategy (Hillesund, 2007).

The problem

The commission deems to prove that Google (regarding search engines) and Facebook (concerning Social Media) became monopolists through unauthorized practices. Furthermore, researchers claim that Amazon and Apple have “lasting and significant market power” that they partly forced by locking out competition through their platforms (De Tijd, 2020). The logical consequence is that competitors are discouraged to innovate. Thereafter, the privacy position of consumers is jeopardized by the dominant position of a handful of tech companies.  It also becomes more difficult to find truthful news if only a few big companies are the spreaders of it.

Examples of wrongdoings

The report claims that Amazon frequently uses third-party sellers to assist in improving and selling their own products. Apple uses its presiding market position to benefit its own applications and hamper those made by rivals. Facebook preserved its monopoly through a chain of anti-competitive business practices. Specifically, it bought up potential rivals such as Instagram. The report states that Google had demanded smartphone manufacturers using its Android operating system should install Google’s chrome as its standard web browser (www.ft.com, 2020).

It can be concluded that Big tech companies did not always use the right means to obtain their market position. Obviously, the big tech companies have responded in a disapproving manner (RTL Nieuws, 2020). This raises some questions for me to you, the reader.

 

Do you think the report was fair and just? Do you think it is beneficial to society that these tech companies have so much market power? If sanctions are imposed, do you think these tech companies should be split up or do you think other sanctions must come into place? Which other sanctions should come into place?

De Tijd. (2020). Amerikaanse commissie pleit voor opsplitsing Big Tech. [online] Available at: https://www.tijd.be/ondernemen/technologie/amerikaanse-commissie-pleit-voor-opsplitsing-big-tech/10256341.html [Accessed 10 Oct. 2020].

Hillesund, T. (2007). Reading Books in the Digital Age subsequent to Amazon, Google and the long tail. First Monday. [online] Available at: http://hdl.handle.net/11250/184283 [Accessed 10 Oct. 2020].

RTL Nieuws. (2020). Commissie VS wil techreuzen opsplitsen: Big Tech is te machtig. [online] Available at: https://www.rtlnieuws.nl/tech/artikel/5188715/commissie-vs-pleit-voor-opsplitsen-big-tech [Accessed 10 Oct. 2020].

Weil, P. Woerner, S.L. (2015). Thriving in an Increasingly Digital Ecosystem. [online] MIT Sloan Management Review. Available at: http://mitsmr.com/1BkdvAq [Accessed 10 Oct. 2020].

www.ft.com. (2020). Subscribe to read | Financial Times. [online] Available at: https://www.ft.com/content/ccf00858-30a2-49d3-9ae9-7db3f58773b0 [Accessed 10 Oct. 2020].

 

Please rate this

Will tomorrow’s smart living room be a spy in your house?

16

October

2019

5/5 (1) Nowadays, smart home devices are becoming more and more popular among households. In the future, around 30 million U.S. households will add smart home technology to their house (Mordorintelligence, 2019). Furthermore, the growth rates of smart home markets in North America and Europe are prospected to be high. Tech giants like Google and Amazon have brought different types of smart home devices on the market, that are most often voice-controlled devices. Examples are Google Home and Amazon Echo (Alexa). These devices are driven by IoT (Internet of Things), in which the smart home device is interconnected with all kinds of other devices in your home. These days, smart home devices are connected to your TV, music system, thermostat, doorbells, and in the near future with your fridge, oven, and kettle (Luimstra, 2019). These will be all controllable with simple questions and commands given by the customer.

Obviously, the implementation of a smart home device could give the customer various advantages. At first, the customer will be given more convenience in and outside the house. Several devices in your household will be more easily being controlled, often with small voice commands. Whether you want to know the best route to your destination when leaving your house, or you want to arrive in a house that’s heated up, or you want to know what movie to watch after the serie you’re almost done with: it’s all possible with a smart home device (Marr, 2019). Secondly, since many voice-assisted home devices are connected with your energy regulator, smart home devices are an ideal way to save on your future energy expenses. According to your preferences, preprogrammed temperatures and lighting schedules can be implemented, which are also easy to modify after. Lastly, smart home devices tend to increase the safety of your house. Smart doorbells are able to livestream the person that’s at your door, which gives a customer more information about people with possible bad intentions (Luimstra, 2019).

However, the safety of smart home devices (and mainly the voice-controlled ones) has been criticised lately. All information that smart home devices need are saved in the cloud (Marr, 2019). While this is convenient, it also creates an easy point for abuse of your personal information. Voice-assistant devices are known to be easily activated by a so-called ‘wake word’, like the word ‘Alexa’ for Amazon’s voice assistant (Karch, 2019). If activated, all information is recorded and saved in the cloud, and is therefore also accessible for hackers or other wrongdoers. Furthermore, the smart home devices have voices that are increasingly sounding like a normal human voice (Weinberger, 2019). Since we emotionally attach value to voices, this could become a problem when a voice-controlled smart home device will talk to outsiders or family people. So, while the positive aspects of smart home devices are obviously present, its negative threats related to security and trust into these systems may not be neglected. Will voice-controlled smart home devices become almost 100% safe? Are we able to distinguish between voices of smart home devices and the voice of one of our relatives? These question are ripe for future discussion.

References:
Karch, M. (2019). Is Your Smart Device Spying on You? How Can You Stop It?. [online] Lifewire. Available at: https://www.lifewire.com/is-your-smart-device-spying-on-you-4141166 [Accessed 15 Oct. 2019].

Luimstra, J. (2019). De slimme IoT-huiskamer: groot goed, of potentiële spionage?. [online] Sprout. Available at: https://www.sprout.nl/artikel/technologie/de-slimme-iot-huiskamer-groot-goed-potentiele-spionage [Accessed 15 Oct. 2019].

Marr, B. (2019). The 7 Most Dangerous Technology Trends In 2020 Everyone Should Know About. [online] Forbes.com. Available at: https://www.forbes.com/sites/bernardmarr/2019/09/23/the-7-most-dangerous-technology-trends-in-2020-everyone-should-know-about/#16a928687780 [Accessed 15 Oct. 2019].

Mordorintelligence. (2019). Smart Homes Market | Growth, Trends, and Forecast (2019 – 2024). [online] Available at: https://www.mordorintelligence.com/industry-reports/global-smart-homes-market-industry [Accessed 15 Oct. 2019].

Weinberger, D. (2019). Can We Trust Machines that Sound Too Much Like Us?. [online] Harvard Business Review. Available at: https://hbr.org/2019/05/can-we-trust-machines-that-sound-too-much-like-us [Accessed 15 Oct. 2019].

Please rate this

5/5 (2) The Threat of Deepfakes

12

October

2019

Please rate this

Last summer an app called DeepNude caused a lot of controversy in the (social) media. Deepnude was an AI based piece of software with the ability to create a very realistic nude pictures of any uploaded face in the app. Mass criticism followed, the app’s servers got overloaded by curious people and not much later, the app went offline permanently. Deepnude stated on twitter that the probability is misuse was too high and that the world “was not ready yet”. The app never came back online ever since  (Deepnude Twitter, 2019). It shows that deepfake technology is becoming available to the public sooner than we thought, including all potential risks.

A definition for DeepFake is “AI-based technology used to produce or alter video content so that it presents something that didn’t, in fact, occur” (Rouse, 2019). As deepfake is AI-based technology it is able to improve over time, as the amount of data input increases and the technology learns to how to create better output. In my opinion deepfake has an amazing potential in the entertainment industry, but there is a serious risk when the technology gets misused. The AI technology makes it harder and harder for humans to distinguish real videos from fake ones. Deepfake videos of world-leaders like Trump and Putin are already to be found on the internet. Also deepfake porn videos of celebrities are being discovered once in a while.

With the upcoming presidential elections of 2020 in the United States, politicians and and many others are seeking solutions to prevent a similar scenario like the 2017 elections. The 2017 presidential elections were characterized by the spread of fake news and the ongoing allegations resulting from it. These events very likely influenced the outcome of those elections (CNN, 2019). Recently the state of California passed a law which “criminalizes the creation and distribution of video content (as well as still images and audio) that are faked to pass off as genuine footage of politicians. (Winder, 2019).” In 2020 we’ll find out whether deepfakes have been restricted succesfully.

I hope developers and users of deepfake technology will become aware of the huge threats of deepfake, and will use it in a responsible way. It is also important for society to stay critical at their news sources and that they prevent supporting these types of technology misuse. According to Wired (Knight, 2019), Google has released thousands of deepfake videos to be used as AI input to detect other deepfake videos. Another company called Deeptrace is using deep learning and AI in order to detect and monitor deepfake videos (Deeptrace, sd).

See you in 2020…

References

CNN. (2019). 2016 Presidential Election Investigation Fast Facts. Retrieved from CNN: https://edition.cnn.com/2017/10/12/us/2016-presidential-election-investigation-fast-facts/index.html

Deepnude Twitter. (2019). deepnudeapp Twitter. Retrieved from Twitter: https://twitter.com/deepnudeapp

Deeptrace. (n.d.). About Deeptrace. Retrieved from Deeptrace: https://deeptracelabs.com/about/

Knight, W. (2019). Even the AI Behind Deepfakes Can’t Save Us From Being Duped. Retrieved from Wired: https://www.wired.com/story/ai-deepfakes-cant-save-us-duped/

Rouse, M. (2019). What is deepfake (deep fake AI). Retrieved from TechTarget: https://whatis.techtarget.com/definition/deepfake

Winder, D. (2019). Forget Fake News, Deepfake Videos Are Really All About Non-Consensual Porn. Retrieved from Forbes: https://www.forbes.com/sites/daveywinder/2019/10/08/forget-2020-election-fake-news-deepfake-videos-are-all-about-the-porn/#26a929963f99