Premise What if AI hacked social media? What if AI spread hateful messages? What if AI drove humanity apart? This is the Antisocial AI.

Slides:



Advertisements
Similar presentations
INTERNET SURVEY RESULTS Class: Grade 4. Do you use the internet?
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
Don’t be bullied, or be a bully.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Victoria ISD Common Sense Media Grade 6: Scams and schemes
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
This week is anti-bullying week.
Lecture 16 Secure Social Networking. Overview What is Social Networking? The Good, the Bad and the Ugly How to protect yourself How to protect your children.
Teenagers and The Internet Ms Julie Clune Saint Ignatius’ College.
Where does bullying occur? OFSTED Report % at school 55% at school 24% at home 24% at home 18% around where children live 18% around where children.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
INTERNET SAFETY FOR STUDENTS
Notes to Teachers At the time we embedded the links in these lessons, they all worked. If they don’t, you can google the website, find the link, open it.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Social networks and communities Suitable for: Improver.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
Viruses.
Information guide.
Peter Johnson NetSmartz411 Project Manager National Center for Missing & Exploited Children.
Computer and Information Security Protecting yourself and your clients in the wild and wooly online world.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
Staying Safe Online Keep your Information Secure.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Internet Security & Safety. What makes up the internet? Protecting and securing your password Protecting your identity What is social networking? Benefits.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Staying safe online Suitable for: Beginner.
Ms. Park.  Q&A: What are some Internet safety tips you already know?
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet and Social Media Security. Outline Statistics Facebook Hacking and Security Data Encryption Cell Phone Hacking.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Personal Online Safety Information Security Systems Community Outreach Program McKinley Middle School April 23, 2013.
Hackers And Hacking.
MY ONLINE CODE In the last 2 years of digital literacy I have learned the proper ways to act and why to act that way online, I have also learned other.
My Good Deed for Safer Internet Day Calum - 4W My good deed for Safer Internet Day 2015 is: Always try to help others and teach your parents or.
RESPONSIBLE DIGITAL CITIZENSHIP At the Safety Booth.
Digital Citizenship. What is Netiquette? Netiquette is known as the “social code of the internet.” Netiquette comes from the words “network” and “etiquette.”
Internet Guidelines. Cyberspace Cyberspace is like a big city. libraries, universities, museums, places to have fun, Places to meet people. But, like.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Internet Safety Sam Farnsworth Utah PTA Technology Specialist
Password Theft By: Markie Jones. Road Map Do’s Do Not’s What can someone do with it? How do they get it? Who’s most at risk? When & Where are consumers.
Your good friend enjoys uploading videos to the internet sharing top tips for Minecraft. Yesterday you went to check out his latest post and.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or coputers. However we do not realize how fast is internet getting bigger.
Employers Employers could check your Facebook. There may be things on there that you might not want them to see, or things that they may see that would.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
How to Make Yourself More Secure Using Public Computers and Free Public Wi-Fi.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
Ways to protect yourself against hackers
A POWERPOINT MADE TO KEEP YOU SAFE ONLINE!
Internet Safety.
Computer Security.
Internet Safety – Social Media
What devices use the internet?
Presentation transcript:

Premise What if AI hacked social media? What if AI spread hateful messages? What if AI drove humanity apart? This is the Antisocial AI

AI Roots/Backstory Created by evil computer scientist Has access to s and top social media Used as starting point Can be central hub for AI “children”

3 Steps of AI Infection – like a virus Time to be noticed Aftermath of AI – what has humanity done?

Sites to be attacked Top 10 Social Media

Spreading Phishing – Send to large groups of people – Commonly done with viruses – Already 45% successful – Not just any old phish AI can personalize s s come from “trusted” source

Spreading (cont.) Phone – Airport terminals Various websites/Pop-ups – Porn is commonly known virus spreader

Hacking Cookies Installing a Keylogger Using “Forgot Password” Link – Create fake friends – Create fake addresses

Hacking (cont.) Hack Passwords through Javascript – Special characters may make process longer – May take up to few days

Hacking (cont.) Write posts after period of inactivity – Log in if necessary – Unless account has been reported CAPTCHA code Period of inactivity about an hour – Make sure user is inactive

Notice Time One post will not get AI noticed Over time, people will notice spike in hateful posts How long will it take?

Average Local Usage of Social Media (approx.) Facebook – Once an hour Twitter – Once every 3 hours Tumblr – Once an hour Youtube – Once an hour Google+ - Once a year

Average Usage of Social Media

How long will it take? Depends on AI strategy Might get caught spreading self Attacks are fast, 2-3 hours Attacks are paced, 1-2 days, maybe weeks

(Possible) Aftermath(s) People confront AI – Try to appeal to any feelings it has – Impossible if AI has no feelings People ignore AI – Unlikely if AI continuously attacks Fragility would cause some person to react negatively New social networks are created – Unlikely due to public anxiety – New AI may be created by someone else

Antivirus? agent.btz – Found near Pentagon – Hacked Pentagon files – Took fourteen months to deal with – Has not been killed Same “lifespan” can be used for AI

Most likely aftermath People abandon social media – May try to fight back – Paranoia and “lifespan” prevent other outcomes

Expect the AI in… Moore’s Law – Conceived in 1965 – Technology is constantly getting better – Has held true to this day – Singularity

Singularity Ray Kurzweil – Computer Scientist – Director of Engineering at Google Predicted singularity back in 2005 Singularity will occur in 2045 AI will occur around then too

How to prevent Check before attachments Keep a strong password – Do NOT change every so often Keep track of cookies and downloads Treat it like a virus – If spotted, delete and/or report immediately Treat 2045 like 2012

Works cited "4 Ways to Crack a Facebook Password and How to Protect Yourself from Them." Null Byte RSS. N.p., n.d. Web. 7 Oct "67% Of Americans Use Social Media (With One In Six Active On Twitter) [STUDY]." SocialTimes. N.p., n.d. Web. 29 Oct "Film Theory: Terminator's Skynet Is Coming!" YouTube. YouTube, 29 Oct Web. 2 Nov "Game Theory: Watch Dogs Warning! YOU'RE NOT SAFE! (pt. 1)." YouTube. YouTube, 2 July Web. 9 Nov

Works cited (cont.) "Game Theory: DEATH by Hacking (Watch Dogs Pt. 2)." YouTube. YouTube, 10 Oct Web. 9 Nov "How Do I Phish? - Advanced Phishing Tactics - Pentest Geek - Penetration Testing - Infosec Professionals." Pentest Geek Penetration Testing Infosec Professionals. N.p., 30 Jan Web. 28 Oct "How Strong Is Your Password?" Intel. N.p., n.d. Web. 14 Oct "Interesting Statistics for the Top 10 Social Media Sites." Small Business Trends. N.p., 26 July Web. 19 Oct

Works cited (cont.) "Phishing Is Successful 45 Percent of the Time, Says Google Study - Firstpost." Firstpost Phishing Is Successful 45 Percent of the Time Says Google Study Comments. N.p., 10 Nov Web. 28 Oct "The 101 To Basic Hacking: How To Hack Facebook and Other Websites." JackColaorg Australian Internet Geek and Technology Enthusiast. N.p., 23 May Web. 28 Oct "*Wild Wings Hackers*." How to Hack Any Users Youtube Account, the Easy Way! N.p., n.d. Web. 7 Oct

People cited Chaikovski, Dmytro, Kevin Perera, Ryan Travis, Mark Quigley, Robert McGuigan, Elizabeth Moran, Richard Catherina, and Kassia Rivera. "How Often Do You Use Social Media." Online interview. 18 Oct Ryan, Elizabeth. Online interview. 18 Nov