Google Duplex: What are the Security Implications?

Google Duplex: What are the Security Implications?

This new AI could present new challenges as well as opportunities

Google Duplex is designed to be indistinguishable from a human. This level of sophistication is not easy to achieve but has been considered the holy grail of AI research for years now. However, as impressive a feat as it would be to introduce an AI so advanced as to be indistinguishable from a human in conversation, such an AI would present new challenges as well as opportunities.

Imposters

For one thing, when AI behaves predictably, it’s much easier to spot when something has gone wrong. More importantly, it’s much easier to detect whether someone else has tampered with it to have it collect sensitive information. Duplex has been designed to interact with other humans on behalf of the user, for example, to book hotel appointments. In fact, Google has gone as far as to include vocal tics like ‘ums and uhs’ in its natural speech patterns.

In the short term, there are concerns that the system could be hijacked and made to say words chosen by hackers. In the long run, as this technology proliferates and diversifies, people may never be entirely sure whether they are in a conversation with a human or an AI. Which brings us on to our next point.

Misuse

If this technology is to become as ubiquitous as Google is hoping it will, we’ll have to face unique ethical and moral challenges. Not least of all the question of how we verify whether we’re speaking to a human or a machine. This is a very cool demonstration of the technology, but it doesn’t offer many real-world benefits to the average user. It does present an absolute goldmine for fraudsters though.

A machine that could speak to humans, and make them believe they are talking to another human, could easily be abused by fraudsters. They would no longer have to worry about a poor performance giving them away; the AI will have no nerves or concerns for its freedom. An AI could conduct call after call without suffering from fatigue, allowing for an unprecedented form of a phishing scam to be perpetrated.

Google is eager to emphasize that that isn’t the purpose of Duplex. They believe that the inclusion of vocal tics makes the technology more user-friendly and less intimidating. That might be true, but it leaves the question of how we can verify who we are speaking with at any given time. How can such a verification occur over the phone in a way that is not replicable by malicious actors?

Google also insist that they understand the concerns about transparency and they are determined to be as open and transparent as possible. As it stands, none of Google’s demonstrations of the tech so far have given us a glimpse of any kind of verification process. That’s not to say it doesn’t exist, Google have certainly been clear that they want it to exist.

However, Google’s stance does beg the question – if you want to be transparent, why hide the fact it’s not a human, to begin with? The use of imperfect speaking and the extra effort that has gone into making it sound human suggests that far from being an unfortunate consequence of the technology, hiding the identity of Duplex is the entire point.

Trust Issues

Given events that have happened over the last few years, there is a growing chasm of mistrust between consumers and tech companies. Until the Facebook scandal, when the business’s true intentions and utter lack of a sense of responsibility were laid bare, there had existed an uneasy truce between tech giants and their customers.

There is no doubt that businesses like Google, Apple, Facebook, etc., have legitimate and harmless reasons to collect personal data about their users. When that data is anonymized properly, it doesn’t compromise our privacy. However, coupled with the industrialized mass-deception that is fake news, there is now a concern about the amount of power that we have collectively seceded to a select few tech giants.

In the current environment, Duplex will ultimately stand or fall on whether it can win the trust of the general public. The potential proliferation of services like Duplex is an excellent reason to invest in a VPN. A virtual private network will prevent you from being tracked and traced online, therefore improving your anonymity. While the technology is still maturing, and you may be understandably wary about giving away too much private information, you should investigate services such.

Google’s Duplex is an exciting demonstration of new and innovative technologies. However, it also throws up some entirely unprecedented ethical and moral quandaries. Solving these security issues will require as much discussion and debate as it will coding.

Featured

  • AI to Help Resolve Non-Emergency Calls Across Utah and Decrease 911 Caller Wait Times

    The Utah Communications Authority (UCA), which oversees the state’s next generation 911 technology services, recently announced that public safety answering points (PSAPs) throughout the state plan to implement Motorola Solutions’ Virtual Response technology to automate the receipt and resolution of 10-digit non-emergency line calls in Utah with the help of AI. Read Now

  • Report: 2025 Video Surveillance Market Set to Grow After Small Decline in 2024

    Novaira Insights has unveiled its latest report, “World Market for Video Surveillance Hardware and Software – 2025 Edition.” The research indicates that the global market for video surveillance hardware and software experienced a slight decline of 0.3% in 2024. This performance fell short of previous forecasts, primarily due to a significant decrease of 7.8% in the Chinese market. Conversely, the rest of the world saw a growth of 4.9%. The global market for video surveillance equipment was estimated to be worth $25.0 billion in 2024. Read Now

  • Report Reveals Local Governments Face Surge in Ransomware Attacks with Minimal Resources

    KnowBe4, the cybersecurity platform that comprehensively addresses human risk management, recently released new research highlighting the critical cybersecurity challenges facing state, local, tribal, and territorial (SLTT) governments. The report details how government organizations have become prime targets for cybercriminals while simultaneously facing severe resource constraints. Read Now

  • Video Surveillance Trends to Watch

    With more organizations adding newer capabilities to their surveillance systems, it’s always important to remember the “basics” of system configuration and deployment, as well as the topline benefits of continually emerging technologies like AI and the cloud. Read Now

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities