Showing posts with label coding. Show all posts
Showing posts with label coding. Show all posts

Sunday, February 11, 2018

Again the thinking about opportunities and risks of artificial intelligence

Picture 1

Kimmo Huosionmaa

People will sometimes ask, what is artificial intelligence? The answer for that question is, that it’s about the computer program, what collects data from various sensors, compiles it with the database, and if there is action in some database, the system will accomplish it. The simplest way to make an example of that computer advantage is the program, what observes the space of computer hard disk. If the usage of this memory increases too high, the program would erase old data from that hard disk. Another way to give an example of that thing is the automatized control system of some airplanes. Then the airplane will rise it nose too fast, will the system make correlative movement independently without the human need to make anything. The artificial intelligence is very effective when a large mass of information need to handle. That system might be used as the selector, what will find risk companies from the many asks for start money.


The system might compile the profit and loss statements fixed costs and incoming money, and if the incoming currency doesn’t fill even those costs, the company is not able to make business. This is why those systems are very effective, they are sharp and they will not get tired. They will not influent from outside, and if there would be some problems with the calculations, could those systems send this kind of applications straight to leaders of the company, because they would cause only losses for that company’s financial department if it will begin to support unwealthy business.


The problem with the financial corporations is that they will get many applications for financial support every day. In this kind of situation, some worker could offer money for business, what is not even meant to success. In the world of artificial intelligence is not feelings. The computers make their decision without mercy, and they will not care about any things, what is not connected with the business.


If the guard of the place is a robot, it won’t make exceptions with the persons, who are allowed to let in. They can equip with sensors, what can notice if the person has something wrong, and if there would be a case of the heart attack the system will call medical attention to that person. The same thing makes those programs so effective in military use.


They don’t care if the attack plane is full of holes, and the artificial intelligence would make everything to accomplish the mission. Those computers don’t afraid anything, and this makes them so deadly. Artificial intelligence might have parameters in its memory, what kind of target is so important, that also the aircraft could sacrifice in the attack, and those drones could use as a ”Kamikaze” planes. The use of artificial intelligence with weapon systems is a growing threat.


When those military systems are equipped with image recognition systems, they can shoot even one specific person, and that might feel very frightened. Modern military drones are connected with the network, where the operators can set same operational parameters in many drones, and that network system allows to connect big supercomputers with those drones, and this allows to give more calculating capacity for the system.


If some persons face having been saved to the combat drones, they would be the hunt this person without mercy, and do they have the authorization to use deadly force in the city area depends how many secondary casualties is allowed to make. And this is the terrifying situation. Because if somebody wants to use that system wrong way, the threat for any person in this planet is very real. Those robots will not have mercy when they will open fire. They don't rebel or deny their missions, and this makes them so effective. Those robots might look like some tank or they might have the human shape, and in wrong hands they are deadly. If somebody wants to misuse the robot, might this person just get the nurse-robot, and then reprogram it for use the weapons. Those robots "muscles" can also replace with more powerful hydraulics and in the body will installed the kevlar armor.


Those vehicles can equip with self-destruction thing, and this will help the operators cover their identity. The use of electron-metal might destroy all data from components, and cover the origin of that system. Also, those robots can be terminated after the mission, and if some criminals use them the example in bank robberies, they can destroy that thing straight after the mission. And those robots can also use as the "mercenaries", what can make very much worse things. This is the thing, what creators of the artificial intelligence must realize when they make their systems.

Sources

Picture 1

http://beyondstandards.ieee.org/wp-content/uploads/2013/06/featured-artificial_intelligence.jpg

Friday, November 24, 2017

Why are computer programs so complicated?



Kimmo Huosionmaa

The complication about computer programs is a huge problem, when we are creating the software, what easy to use. If the program is easy for end user, the programmers must make very complicated code, and those systems must be bases the far taken artificial intelligence, what will allow the end user to control those systems with easy interfaces, what have only one button, if we are talking about ideal interface for full automatized systems. The interface is very easy, only one button what will start and stop the operation. But if that interface will be real, must that system be very independent, for complete the operation successfully.


That is the primary problem with integrated computing systems, where computers control some robots or other physical systems like ABS brakes of the automobiles. If that system fails the result might be devastating if the other side wheels will lock and another side continues rolling. That is the worst case scenario, what could happen on the road. But when automobile motor electronic circuits will fail, the result might be even more terrible, what we ever thought. If the hackers infect some automobile electronic control systems with the computer virus, they might cause the situation, where the car will not obey gas or brake pedals.


Also “steam hackers” can cause horrible situations, if they put the winch in the car. That remote-controlled system might cause the even bigger danger that hackers ever can imagine. That winch would work the same way as the remote-controlled bomb, and it will just pull the gas pedal down, and you might guess, what will happen if this will happen in the wrong place. The problem with security of the automobiles or other integrated systems is, that they are too focused on data security. Those very complicated systems are also under threat of physical damages and attacks.


But the most influential threat comes from those systems own security equipment. If somebody reprograms the chip of the automobiles electronic key, the hacker can infect the computer system of that vehicle. Some hackers have spoken the opportunity and the threat, where somebody reprograms the chip of the bankcard and infects the all banking system of the Europe. But if some hacker will infect the transponder of some aircraft with computer virus program, will be able to cause very many damages to the airfield security.


The most modern military aircraft like F-36 can transmit the computer viruses to the target systems, what can cause the situation, where enemies command systems will be the collapse in the critical time. Also, the warships radars have that capacity. The computer viruses are only the integrated ECM-systems, what will transmit the computer viruses inside their jamming signals. And of course, those military machines have their physical weapons like missiles and bombs for attack missions. So the computer viruses are only the part of the support systems, what makes those machines attack harder to their targets, what is not protected with proper firewalls and antivirus software.

Wednesday, October 11, 2017

Cyber weapons are cheap and effective tool what almost anybody can get




Copyright for picture Saxonsgroup.com.au

Kimmo Huosionmaa

Cyber weapons are an effective tool if somebody wants to harm Internet-based networks. This kind of weapon is in the worst scenario so effective as so-called "blackout" bomb. Cyber weapons are actually computer viruses or other malware what will destroy computers operating systems and databases and if malware is so-called "logical bomb". This type of computer virus is made that it activates in one particular day when it can cause very bad damages for computer infrastructure.


Computer weapons are theoretically ineffective against military system what is prepared for an attack. But if an attacker finds system what is not immune to computer viruses he must cause very much trouble. In the worst scenario, the cyber attacker takes control in some nuclear plants computer. And in this scenario heart of reactor melts down and causes china syndrome, what could cause very large scale nuclear disaster, because in this scenario liquid plutonium will flow to land.


Those command systems are theoretically immune because they use special Unix or Linux based operating systems and there is used the only special checked code, what will not upload from the Internet. But there is a backdoor what might use with a cyber attack. If the key card will be reprogrammed with the computer virus, what will break in the system by door scanners could situation turn very bad. Computer virus can't destroy the operating system itself but it can remove databases of the system.


If backup systems don't connect automatically when problems will see, there is a risk that operational control will be loose is very real. Cyber weapons are more effective against civil ICT-infrastructure. This kind of attack may be for financial reasons, and it might use by criminals who want to make bank robbery with hacking. After hacking a system with master users password the criminal must cover his prints and after money transferring they could explode all logs of the system.


This is for deleting databases what mission is to collect information of data traffic, and that will make impossible to tracking those guys from the net. Otherwise using "logical bomb" will be used in simple blackmailing operation. After hiding malware to some company's network could criminals sent a letter to that company, that if the target will give them a million criminals will give code what helps them to remove the virus from the system of that company. Some cyber weapons just sent "ping" or "echo request" asks for the target system, what can't be used in normal Internet communication, and this kind of attack is called a denial of service attack.


The cyber attacker can also use malware for spying some systems. And that kind of malware can give any information what moves in target organization computers to the spy who collects data for production plannings and next year designs. That can cause very strong financial problems to a company what have spent time and money for a new design of a product.  And after that, some hacker steals that data and sells that to other companies what can begin production immediately. That's why stealing business secrets is against law.

New autonomous task units are entering service.

"The deal will create much-needed competition for the Department of War acquisition process. (Representational image)" (Interestin...