Google Duplex: What are the Security Implications?

Google Duplex: What are the Security Implications?

This new AI could present new challenges as well as opportunities

Google Duplex is designed to be indistinguishable from a human. This level of sophistication is not easy to achieve but has been considered the holy grail of AI research for years now. However, as impressive a feat as it would be to introduce an AI so advanced as to be indistinguishable from a human in conversation, such an AI would present new challenges as well as opportunities.

Imposters

For one thing, when AI behaves predictably, it’s much easier to spot when something has gone wrong. More importantly, it’s much easier to detect whether someone else has tampered with it to have it collect sensitive information. Duplex has been designed to interact with other humans on behalf of the user, for example, to book hotel appointments. In fact, Google has gone as far as to include vocal tics like ‘ums and uhs’ in its natural speech patterns.

In the short term, there are concerns that the system could be hijacked and made to say words chosen by hackers. In the long run, as this technology proliferates and diversifies, people may never be entirely sure whether they are in a conversation with a human or an AI. Which brings us on to our next point.

Misuse

If this technology is to become as ubiquitous as Google is hoping it will, we’ll have to face unique ethical and moral challenges. Not least of all the question of how we verify whether we’re speaking to a human or a machine. This is a very cool demonstration of the technology, but it doesn’t offer many real-world benefits to the average user. It does present an absolute goldmine for fraudsters though.

A machine that could speak to humans, and make them believe they are talking to another human, could easily be abused by fraudsters. They would no longer have to worry about a poor performance giving them away; the AI will have no nerves or concerns for its freedom. An AI could conduct call after call without suffering from fatigue, allowing for an unprecedented form of a phishing scam to be perpetrated.

Google is eager to emphasize that that isn’t the purpose of Duplex. They believe that the inclusion of vocal tics makes the technology more user-friendly and less intimidating. That might be true, but it leaves the question of how we can verify who we are speaking with at any given time. How can such a verification occur over the phone in a way that is not replicable by malicious actors?

Google also insist that they understand the concerns about transparency and they are determined to be as open and transparent as possible. As it stands, none of Google’s demonstrations of the tech so far have given us a glimpse of any kind of verification process. That’s not to say it doesn’t exist, Google have certainly been clear that they want it to exist.

However, Google’s stance does beg the question – if you want to be transparent, why hide the fact it’s not a human, to begin with? The use of imperfect speaking and the extra effort that has gone into making it sound human suggests that far from being an unfortunate consequence of the technology, hiding the identity of Duplex is the entire point.

Trust Issues

Given events that have happened over the last few years, there is a growing chasm of mistrust between consumers and tech companies. Until the Facebook scandal, when the business’s true intentions and utter lack of a sense of responsibility were laid bare, there had existed an uneasy truce between tech giants and their customers.

There is no doubt that businesses like Google, Apple, Facebook, etc., have legitimate and harmless reasons to collect personal data about their users. When that data is anonymized properly, it doesn’t compromise our privacy. However, coupled with the industrialized mass-deception that is fake news, there is now a concern about the amount of power that we have collectively seceded to a select few tech giants.

In the current environment, Duplex will ultimately stand or fall on whether it can win the trust of the general public. The potential proliferation of services like Duplex is an excellent reason to invest in a VPN. A virtual private network will prevent you from being tracked and traced online, therefore improving your anonymity. While the technology is still maturing, and you may be understandably wary about giving away too much private information, you should investigate services such.

Google’s Duplex is an exciting demonstration of new and innovative technologies. However, it also throws up some entirely unprecedented ethical and moral quandaries. Solving these security issues will require as much discussion and debate as it will coding.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West
  • Live From ISC West 2024: Post-Show Recap

    ISC West 2024 is complete. And from start to finish, the entire conference was a huge success with almost 30,000 people in attendance. Read Now

    • Industry Events
    • ISC West
  • ISC West 2024 is a Rousing Success

    The 2024 ISC West security tradeshow marked a pivotal moment in the industry, showcasing cutting-edge technology and innovative solutions to address evolving security challenges. Exhibitors left the event with a profound sense of satisfaction, as they witnessed a high level of engagement from attendees and forged valuable connections with potential clients and partners. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3