My Account Log in

1 option

The language of deception : weaponizing next generation AI / Justin Hutchens and Stuart McClure.

O'Reilly Online Learning: Academic/Public Library Edition Available online

O'Reilly Online Learning: Academic/Public Library Edition
Format:
Book
Author/Creator:
Hutchens, Justin, author.
McClure, Stuart, author.
Language:
English
Subjects (All):
Natural language processing (Computer science)--Social aspects.
Natural language processing (Computer science).
Natural language processing (Computer science)--Philosophy.
Social engineering.
Artificial intelligence--Computer programs.
Artificial intelligence.
Robotics.
Physical Description:
1 online resource (402 pages)
Edition:
First edition.
Place of Publication:
Hoboken, New Jersey : John Wiley & Sons, Inc., [2024]
Summary:
A penetrating look at the dark side of emerging AI technologies In The Language of Deception: Weaponizing Next Generation AI, artificial intelligence and cybersecurity veteran Justin Hutchens delivers an incisive and penetrating look at how contemporary and future AI can and will be weaponized for malicious and adversarial purposes. In the book, you will explore multiple foundational concepts to include the history of social engineering and social robotics, the psychology of deception, considerations of machine sentience and consciousness, and the history of how technology has been weaponized in the past. From these foundations, the author examines topics related to the emerging risks of advanced AI technologies, to include: The use of Large Language Models (LLMs) for social manipulation, disinformation, psychological operations, deception and fraud The implementation of LLMs to construct fully autonomous social engineering systems for targeted attacks or for mass manipulation at scale The technical use of LLMs and the underlying transformer architecture for use in technical weapons systems to include advanced next-generation malware, physical robotics, and even autonomous munition systems Speculative future risks such as the alignment problem, disembodiment attacks, and flash wars. Perfect for tech enthusiasts, cybersecurity specialists, and AI and machine learning professionals, The Language of Deception is an insightful and timely take on an increasingly essential subject.
Contents:
Intro
Table of Contents
Title Page
Foreword
Introduction
Reader Support for This Book
Chapter 1: Artificial Social Intelligence
Positronic Man
Defining (Artificial) Social Intelligence
The Turing Test
The Semblance of Social Intelligence
The Question of Weaponization
Chapter 2: Social Engineering and Psychological Exploitation
The Roots of Social Engineering
Social Engineering and Psychology
Applied Social Engineering
One Principle to Rule Them
The Long Con
Loose Lips Sink Ships
The Takeaway
Chapter 3: A History of Technology and Social Engineering
Advertising
Propaganda
Cybercrime
The Rise of the Bots
The Worst Is Yet to Come
Chapter 4: A History of Language Modeling
Rule-Based NLP Systems
Statistical Language Models
Rule-Based vs. Statistical Models
Note
Chapter 5: Consciousness, Sentience, and Understanding
Mad as a Hatter
The Question of Consciousness
The Sentience Scare
Chapter 6: The Imitation Game
The Chinese Room
The Democratization of Machine Interaction
Emergent Properties
Reinforcement Learning from Human Feedback
Likeable Robots
The Illusion of Empathy
Chapter 7: Weaponizing Social Intelligence
Where's the Risk?
The Spontaneous and Organic Occurrence of Turing Tests
Bot or Not?â€"CAPTCHA Evasion
Creating the Illusion of Conversation
Context Crafting
Unleash the Bots
Conversational Relays with LLMs
Optimizing Social Engineering with Monte Carlo Simulations
Remaining under the Radar
The Impending AI Scourge
Notes
Chapter 8: Weaponizing Technical Intelligence
Unintended Technical Problems
Deliberate Technical Exploitation
Chapter 9: Multimodal Manipulation
Converging on Transformers
Deepfake Imagery
Sociopolitical Destabilization.
Voice Synthesis and Duplication
Physical Robotics
Chapter 10: The Future
Physical Embodiment
Inside the Echo Chamber
Artificial Super Intelligence
Singularity
Cognitive Integration (BCI)
Chapter 11: The Quest for Resolution
Tactical Solutions
Stopping a Runaway Train
AI Risk Management
Global Partnership
Appendix A: Bot Automation
Browser Emulation
Browser Automation
Appendix B: LLM Pretext Engineering
Social Security Administration Proof of Concept
Credential Harvesting Proof of Concept
Wire Fraud Proof of Concept
Appendix C: CAPTCHA Bypass
Appendix D: Context Manipulation Attacks
Appendix E: Attack Optimization with Monte Carlo Simulations
Appendix F: Autonomous C2 Operations with LLMs
Appendix G: Disembodiment Attacks
Bibliography
Acknowledgments
About the Author
Index
Copyright
Dedication
End User License Agreement.
Notes:
Description based on print version record.
Includes bibliographical references and index.
ISBN:
9781394222568
1394222564
9781394222551
1394222556
OCLC:
1410561531

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account