{"id":41388,"date":"2020-08-14T04:09:00","date_gmt":"2020-08-14T08:09:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=41388"},"modified":"2020-08-14T04:09:00","modified_gmt":"2020-08-14T08:09:00","slug":"evil-ai-these-are-the-20-most-dangerous-crimes-that-artificial-intelligence-will-create","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/08\/14\/evil-ai-these-are-the-20-most-dangerous-crimes-that-artificial-intelligence-will-create\/","title":{"rendered":"Evil AI: These are the 20 most dangerous crimes that artificial intelligence will create"},"content":{"rendered":"\n<p>Because some people just can&#8217;t resist going down the dark path. <\/p>\n\n\n\n<p>By\u00a0<a href=\"https:\/\/www.zdnet.com\/meet-the-team\/uk\/daphne+leprince-ringuet\/\">Daphne Leprince-Ringuet\u00a0<\/a> &#8211; From targeted phishing campaigns to new stalking methods: there are plenty of ways that <strong>artificial intelligence<\/strong> could be used to cause harm if it fell into the wrong hands. A team of researchers decided to rank the potential criminal applications that <strong>AI <\/strong>will have in the next 15 years, starting with those we should worry the most about. At the top of the list of most serious threats? Deepfakes.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2017\/12\/06\/15\/39\/knight-3002031__340.jpg\" alt=\"\" width=\"624\" height=\"392\"\/><\/figure>\n\n\n\n<p>By using fake audio and video to impersonate another person, the technology can cause various types of harms, said the researchers. The threats range from discrediting public figures to influence public opinion, to extorting funds by impersonating someone&#8217;s child or relatives over a video call.&nbsp;<\/p>\n\n\n\n<p>The ranking was\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.ucl.ac.uk\/news\/2020\/aug\/deepfakes-ranked-most-serious-ai-crime-threat\" target=\"_blank\">put together after scientists from University College London (UCL) compiled a list of 20 <strong>AI<\/strong>-enabled crimes<\/a>\u00a0based on academic papers, news and popular culture, and got a few dozen experts to discuss the severity of each threat during a two-day seminar.\u00a0 <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.zdnet.com\/article\/evil-ai-these-are-the-20-most-dangerous-crimes-that-artificial-intelligence-will-create\/&amp;ct=ga&amp;cd=CAEYASoTMjg5MDUyMDcyNzk1NjY5MDUwNDIaNDc3ZTJlNTE2ZWYxZDQ3OTpjb206ZW46VVM&amp;usg=AFQjCNFJJoCDrDNTgIl3LdKtsAKfdwviPQ\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Because some people just can&#8217;t resist going down the dark path. By\u00a0Daphne Leprince-Ringuet\u00a0 &#8211; From targeted phishing campaigns to new stalking methods: there are plenty of ways that artificial intelligence could be used to cause harm if it fell into <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/08\/14\/evil-ai-these-are-the-20-most-dangerous-crimes-that-artificial-intelligence-will-create\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[638,640],"tags":[639,641],"class_list":["post-41388","post","type-post","status-publish","format-standard","hentry","category-ai","category-artificial-intelligence-ai","tag-ai","tag-artificial-intelligence-2"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/41388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=41388"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/41388\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=41388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=41388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=41388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}