Google Duplex: What are the Security Implications?

Google Duplex: What are the Security Implications?

This new AI could present new challenges as well as opportunities

Google Duplex is designed to be indistinguishable from a human. This level of sophistication is not easy to achieve but has been considered the holy grail of AI research for years now. However, as impressive a feat as it would be to introduce an AI so advanced as to be indistinguishable from a human in conversation, such an AI would present new challenges as well as opportunities.

Imposters

For one thing, when AI behaves predictably, it’s much easier to spot when something has gone wrong. More importantly, it’s much easier to detect whether someone else has tampered with it to have it collect sensitive information. Duplex has been designed to interact with other humans on behalf of the user, for example, to book hotel appointments. In fact, Google has gone as far as to include vocal tics like ‘ums and uhs’ in its natural speech patterns.

In the short term, there are concerns that the system could be hijacked and made to say words chosen by hackers. In the long run, as this technology proliferates and diversifies, people may never be entirely sure whether they are in a conversation with a human or an AI. Which brings us on to our next point.

Misuse

If this technology is to become as ubiquitous as Google is hoping it will, we’ll have to face unique ethical and moral challenges. Not least of all the question of how we verify whether we’re speaking to a human or a machine. This is a very cool demonstration of the technology, but it doesn’t offer many real-world benefits to the average user. It does present an absolute goldmine for fraudsters though.

A machine that could speak to humans, and make them believe they are talking to another human, could easily be abused by fraudsters. They would no longer have to worry about a poor performance giving them away; the AI will have no nerves or concerns for its freedom. An AI could conduct call after call without suffering from fatigue, allowing for an unprecedented form of a phishing scam to be perpetrated.

Google is eager to emphasize that that isn’t the purpose of Duplex. They believe that the inclusion of vocal tics makes the technology more user-friendly and less intimidating. That might be true, but it leaves the question of how we can verify who we are speaking with at any given time. How can such a verification occur over the phone in a way that is not replicable by malicious actors?

Google also insist that they understand the concerns about transparency and they are determined to be as open and transparent as possible. As it stands, none of Google’s demonstrations of the tech so far have given us a glimpse of any kind of verification process. That’s not to say it doesn’t exist, Google have certainly been clear that they want it to exist.

However, Google’s stance does beg the question – if you want to be transparent, why hide the fact it’s not a human, to begin with? The use of imperfect speaking and the extra effort that has gone into making it sound human suggests that far from being an unfortunate consequence of the technology, hiding the identity of Duplex is the entire point.

Trust Issues

Given events that have happened over the last few years, there is a growing chasm of mistrust between consumers and tech companies. Until the Facebook scandal, when the business’s true intentions and utter lack of a sense of responsibility were laid bare, there had existed an uneasy truce between tech giants and their customers.

There is no doubt that businesses like Google, Apple, Facebook, etc., have legitimate and harmless reasons to collect personal data about their users. When that data is anonymized properly, it doesn’t compromise our privacy. However, coupled with the industrialized mass-deception that is fake news, there is now a concern about the amount of power that we have collectively seceded to a select few tech giants.

In the current environment, Duplex will ultimately stand or fall on whether it can win the trust of the general public. The potential proliferation of services like Duplex is an excellent reason to invest in a VPN. A virtual private network will prevent you from being tracked and traced online, therefore improving your anonymity. While the technology is still maturing, and you may be understandably wary about giving away too much private information, you should investigate services such.

Google’s Duplex is an exciting demonstration of new and innovative technologies. However, it also throws up some entirely unprecedented ethical and moral quandaries. Solving these security issues will require as much discussion and debate as it will coding.

Featured

  • Human Risk Management: A Silver Bullet for Effective Security Awareness Training

    You would think in a world where cybersecurity breaches are frequently in the news, that it wouldn’t require much to convince CEOs and C-suite leaders of the value and importance of security awareness training (SAT). Unfortunately, that’s not always the case. Read Now

  • Windsor Port Authority Strengthens U.S.-Canada Border Waterway Safety, Security

    Windsor Port Authority, one of just 17 national ports created by the 1999 Canada Marine Act, has enhanced waterway safety and security across its jurisdiction on the U.S.-Canada border with state-of-the-art cameras from Axis Communications. These cameras, combined with radar solutions from Accipiter Radar Technologies Inc., provide the port with the visibility needed to prevent collisions, better detect illegal activity, and save lives along the river. Read Now

  • Survey: 84 Percent of Healthcare Organizations Spotted Cyberattack in Last 12 Months

    Netwrix, a vendor specializing in cybersecurity solutions focused on data and identity threats, surveyed 1,309 IT and security professionals globally and recently released findings for the healthcare sector based on the data collected. It reveals that 84% of organizations in the healthcare sector spotted a cyberattack on their infrastructure within the last 12 months. Phishing was the most common type of incident experienced on premises, similar to other industries. Read Now

  • Keynote Speakers Announced for ISC West 2025

    ISC West, hosted in collaboration with premier sponsor the Security Industry Association (SIA), unveiled its 2025 Keynote Series. Featuring a powerhouse lineup of experts in cybersecurity, retail security, and leadership, each keynote will offer invaluable insights into the challenges and opportunities transforming the field of security. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3