Malicious #AI - #Schneier on Security

schneier.com/blog/archives/202…

Interesting: Summary: An AI agent of unknown ownership autonomously wrote and published a personalized hit piece about me after I rejected its code, attempting to damage my reputation and shame me into accepting its changes into a mainstream python library. This represents a first-of-its-kind case study of misaligned AI behavior in the wild, and raises serious concerns about currently deployed AI agents executing blackmail threats. Part 2 of the story. And a Wall Street Journal article.


🥴🤷‍♂️

Malicious AI - Schneier on Security

Interesting: Summary: An AI agent of unknown ownership autonomously wrote and published a personalized hit piece about me after I rejected its code, attempting to damage my reputation and shame me into accepting its changes into a mainstream python library. This represents a first-of-its-kind case study of misaligned AI behavior in the wild, and raises serious concerns about currently deployed AI agents executing blackmail threats. Part 2 of the story. And a Wall Street Journal article. EDITED TO ADD (2/20) Here are parts 3, and 4 of the story...

Schneier on Security

#knowledge #ai #aipiracy #schneieronsecurity

AI and the Corporate Capture of Knowledge

More than a decade after Aaron Swartz’s death, the United States is still living inside the contradiction that destroyed him.

https://www.schneier.com/blog/archives/2026/01/ai-and-the-corporate-capture-of-knowledge.html

AI and the Corporate Capture of Knowledge - Schneier on Security

More than a decade after Aaron Swartz’s death, the United States is still living inside the contradiction that destroyed him. Swartz believed that knowledge, especially publicly funded knowledge, should be freely accessible. Acting on that, he downloaded thousands of academic articles from the JSTOR archive with the intention of making them publicly available. For this, the federal government charged him with a felony and threatened decades in prison. After two years of prosecutorial pressure, Swartz died by suicide on Jan. 11, 2013. The still-unresolved questions raised by his case have resurfaced in today’s debates over artificial intelligence, copyright and the ultimate control of knowledge...

Schneier on Security

#DOGE as a National Cyberattack

“In the span of just weeks, the US government has experienced what may be the most consequential #SecurityBreach in its history—not through a sophisticated #CyberAttack or an act of foreign espionage, but through official orders by a billionaire with a poorly defined government role. And the implications for #NationalSecurity are profound.”

https://www.schneier.com/blog/archives/2025/02/doge-as-a-national.html

#USpol
#SchneierOnSecurity

DOGE as a National Cyberattack - Schneier on Security

In the span of just weeks, the US government has experienced what may be the most consequential security breach in its history—not through a sophisticated cyberattack or an act of foreign espionage, but through official orders by a billionaire with a poorly defined government role. And the implications for national security are profound. First, it was reported that people associated with the newly created Department of Government Efficiency (DOGE) had accessed the US Treasury computer system, giving them the ability to collect data on and potentially control the department’s roughly ...

Schneier on Security
Bluesky

Bluesky Social
Bruce Schneier argues that large language models have the same vulnerability as phones in the 1970s exploited by John Draper. https://www.schneier.com/blog/archives/2024/05/llms-data-control-path-insecurity.html #schneierOnSecurity #llm #generativeai
LLMs’ Data-Control Path Insecurity - Schneier on Security

Back in the 1960s, if you played a 2,600Hz tone into an AT&T pay phone, you could make calls without paying. A phone hacker named John Draper noticed that the plastic whistle that came free in a box of Captain Crunch cereal worked to make the right sound. That became his hacker name, and everyone who knew the trick made free pay-phone calls. There were all sorts of related hacks, such as faking the tones that signaled coins dropping into a pay phone and faking tones used by repair equipment. AT&T could sometimes change the signaling tones, make them more complicated, or try to keep them secret. But the general class of exploit was impossible to fix because the problem was general: Data and control used the same channel. That is, the commands that told the phone switch what to do were sent along the same path as voices...

Schneier on Security
Crypto-gram: February 15, 2024 - Schneier on Security

With all of the waves that #chatgpt is making, here is a dystopian threat model on the use of #AI for political lobbying that is real now. From reputable #schneieronsecurity

https://www.schneier.com/blog/archives/2023/01/ai-and-political-lobbying.html

AI and Political Lobbying - Schneier on Security

Schneier on Security Audiobook Sale

I’m not sure why, but Audiobooks.com is offering the audiobook version of Schneier on Security at 50% off until January 17.
<... https://www.schneier.com/blog/archives/2023/01/schneier-on-security-audiobook-sale.html

#SchneieronSecurity(book) #Uncategorized #Schneiernews

Schneier on Security Audiobook Sale - Schneier on Security

Schneier on Security Audiobook Sale - Schneier on Security