Google Duplex: What are the Security Implications?

Google Duplex: What are the Security Implications?

This new AI could present new challenges as well as opportunities

Google Duplex is designed to be indistinguishable from a human. This level of sophistication is not easy to achieve but has been considered the holy grail of AI research for years now. However, as impressive a feat as it would be to introduce an AI so advanced as to be indistinguishable from a human in conversation, such an AI would present new challenges as well as opportunities.

Imposters

For one thing, when AI behaves predictably, it’s much easier to spot when something has gone wrong. More importantly, it’s much easier to detect whether someone else has tampered with it to have it collect sensitive information. Duplex has been designed to interact with other humans on behalf of the user, for example, to book hotel appointments. In fact, Google has gone as far as to include vocal tics like ‘ums and uhs’ in its natural speech patterns.

In the short term, there are concerns that the system could be hijacked and made to say words chosen by hackers. In the long run, as this technology proliferates and diversifies, people may never be entirely sure whether they are in a conversation with a human or an AI. Which brings us on to our next point.

Misuse

If this technology is to become as ubiquitous as Google is hoping it will, we’ll have to face unique ethical and moral challenges. Not least of all the question of how we verify whether we’re speaking to a human or a machine. This is a very cool demonstration of the technology, but it doesn’t offer many real-world benefits to the average user. It does present an absolute goldmine for fraudsters though.

A machine that could speak to humans, and make them believe they are talking to another human, could easily be abused by fraudsters. They would no longer have to worry about a poor performance giving them away; the AI will have no nerves or concerns for its freedom. An AI could conduct call after call without suffering from fatigue, allowing for an unprecedented form of a phishing scam to be perpetrated.

Google is eager to emphasize that that isn’t the purpose of Duplex. They believe that the inclusion of vocal tics makes the technology more user-friendly and less intimidating. That might be true, but it leaves the question of how we can verify who we are speaking with at any given time. How can such a verification occur over the phone in a way that is not replicable by malicious actors?

Google also insist that they understand the concerns about transparency and they are determined to be as open and transparent as possible. As it stands, none of Google’s demonstrations of the tech so far have given us a glimpse of any kind of verification process. That’s not to say it doesn’t exist, Google have certainly been clear that they want it to exist.

However, Google’s stance does beg the question – if you want to be transparent, why hide the fact it’s not a human, to begin with? The use of imperfect speaking and the extra effort that has gone into making it sound human suggests that far from being an unfortunate consequence of the technology, hiding the identity of Duplex is the entire point.

Trust Issues

Given events that have happened over the last few years, there is a growing chasm of mistrust between consumers and tech companies. Until the Facebook scandal, when the business’s true intentions and utter lack of a sense of responsibility were laid bare, there had existed an uneasy truce between tech giants and their customers.

There is no doubt that businesses like Google, Apple, Facebook, etc., have legitimate and harmless reasons to collect personal data about their users. When that data is anonymized properly, it doesn’t compromise our privacy. However, coupled with the industrialized mass-deception that is fake news, there is now a concern about the amount of power that we have collectively seceded to a select few tech giants.

In the current environment, Duplex will ultimately stand or fall on whether it can win the trust of the general public. The potential proliferation of services like Duplex is an excellent reason to invest in a VPN. A virtual private network will prevent you from being tracked and traced online, therefore improving your anonymity. While the technology is still maturing, and you may be understandably wary about giving away too much private information, you should investigate services such.

Google’s Duplex is an exciting demonstration of new and innovative technologies. However, it also throws up some entirely unprecedented ethical and moral quandaries. Solving these security issues will require as much discussion and debate as it will coding.

Featured

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

  • Where AI Meets Human Judgment

    Artificial intelligence is everywhere these days. It is driving business growth, shaping consumer experiences, and showing up in places most of us never imagined just a few years ago. Read Now

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities