0:04
there are big concerns about AI as its
0:06
use becomes more and more common in our
0:08
everyday life and we need to be
0:11
attentive to that what we need to be
0:13
concerned about is how it's implemented
0:16
and does the governments of the world do
0:19
they have uh a good plan for laws
0:22
policies governance and leadership in
0:24
order to uh integrate these Technologies
0:27
and sadly right now they absolutely do
0:29
not Dr Hans mom is the author of 34
0:32
research papers numerous books and is
0:35
considered an expert in a diverse set of
0:37
fields ranging from autonomous systems
0:40
AI machine learning energy and
0:42
disruptive Technologies and he's looked
0:45
at the risks of AI as well as how to
0:48
best manage it you have to be able to
0:50
train Ai and when you train it you have
0:52
to decide are you going to let the
0:54
computer come up with the answer or are
0:56
you going to give it the answer and show
0:58
it how to do it the scary part is the
1:01
training data is really where everything
1:03
is most training data is not secure that
1:06
data security is a big issue because it
1:09
can be manipulated by anybody who gets
1:12
into a computer system via a back door
1:15
here is how it's done I'm not going to
1:17
attack your computer systems name I'm
1:19
simply going to go find out who is
1:21
running your training data I am going to
1:24
insert code into your training data and
1:27
it is going to train the model wrong
1:29
it's going to get the the wrong answer
1:30
every time and then there is the
1:33
internet of things all kinds of devices
1:35
like appliances connected to the
1:37
internet it is another area of
1:41
vulnerability in 2013 target was hit
1:44
with a data breach affecting 70 million
1:47
people in a backdoor attack involving
1:49
the Internet of Things the consequences
1:52
of which are still being felt 12 years
1:55
later it was one of the largest attacks
1:57
in history and that was all because of a
2:01
nest thermostat that was being used by a
2:04
third party by one of their vendors that
2:06
vendor had Direct access into Target
2:09
systems the problem with data access is
2:12
in the last 20 to 25 years all of our
2:15
cyber security has been built around
2:17
central processing but that matters less
2:20
and less now because the state-ofthe-art
2:22
has changed we don't have sensor
2:24
processing anymore so almost all of our
2:27
our cyber security stuff is actually
2:29
broken and we're trying to fix it well
2:31
now we're playing ketchup again do each
2:33
of us have to become responsible for our
2:35
own cyber security Now that now
2:38
everything is so decentralized in the US
2:41
we look and we say well the government
2:42
should be responsible for everything no
2:45
that doesn't work so we do have to be
2:47
responsible for ourselves the question
2:49
as to whether we're going to need to do
2:51
that uh for each individual the answer
2:54
is yes to do that you need to practice
2:56
good cyber hygiene here are a couple of
2:58
steps to start you off first of all
3:00
update all of your passwords on a
3:02
regular basis also keep software and all
3:05
devices connected to the internet
3:07
updated and finally you need to secure
3:10
your Wi-Fi against Intruders working for
3:13
you I'm the consumer guy Steve spria