Artwork

Content provided by Michaël Trazzi. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michaël Trazzi or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

[Jan 2023] Jeffrey Ladish on AI Augmented Cyberwarfare and compute monitoring

33:04
 
Share
 

Manage episode 397887103 series 2966339
Content provided by Michaël Trazzi. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michaël Trazzi or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Jeffrey Ladish is the Executive Director of Palisade Research which aimes so "study the offensive capabilities or AI systems today to better understand the risk of losing control to AI systems forever". He previously helped build out the information security program at Anthropic.

Audio is a edit & re-master of the Twitter Space on "AI Governance and cyberwarfare" that happened a year ago. Posting now because I have only recently discovered how to get the audio & video from Twitter spaces and (most of) the arguments are still relevant today Jeffrey would probably have a lot more to say on things that happened since last year, but I still thought this was an interesting twitter spaces. Some of it was cutout to make it enjoyable to watch. Original: https://twitter.com/i/spaces/1nAKErDmWDOGL To support the channel: https://www.patreon.com/theinsideview Jeffrey: https://twitter.com/jeffladish Me: https://twitter.com/MichaelTrazzi

OUTLINE

(00:00) The Future of Automated Cyber Warfare and Network Exploitation

(03:19) Evolution of AI in Cybersecurity: From Source Code to Remote Exploits

(07:45) Augmenting Human Abilities with AI in Cybersecurity and the Path to AGI

(12:36) Enhancing AI Capabilities for Complex Problem Solving and Tool Integration

(15:46) AI Takeover Scenarios: Hacking and Covert Operations

(17:31) AI Governance and Compute Regulation, Monitoring

(20:12) Debating the Realism of AI Self-Improvement Through Covert Compute Acquisition

(24:25) Managing AI Autonomy and Control: Lessons from WannaCry Ransomware Incident

(26:25) Focusing Compute Monitoring on Specific AI Architectures for Cybersecurity Management

(29:30) Strategies for Monitoring AI: Distinguishing Between Lab Activities and Unintended AI Behaviors

  continue reading

54 episodes

Artwork
iconShare
 
Manage episode 397887103 series 2966339
Content provided by Michaël Trazzi. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Michaël Trazzi or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Jeffrey Ladish is the Executive Director of Palisade Research which aimes so "study the offensive capabilities or AI systems today to better understand the risk of losing control to AI systems forever". He previously helped build out the information security program at Anthropic.

Audio is a edit & re-master of the Twitter Space on "AI Governance and cyberwarfare" that happened a year ago. Posting now because I have only recently discovered how to get the audio & video from Twitter spaces and (most of) the arguments are still relevant today Jeffrey would probably have a lot more to say on things that happened since last year, but I still thought this was an interesting twitter spaces. Some of it was cutout to make it enjoyable to watch. Original: https://twitter.com/i/spaces/1nAKErDmWDOGL To support the channel: https://www.patreon.com/theinsideview Jeffrey: https://twitter.com/jeffladish Me: https://twitter.com/MichaelTrazzi

OUTLINE

(00:00) The Future of Automated Cyber Warfare and Network Exploitation

(03:19) Evolution of AI in Cybersecurity: From Source Code to Remote Exploits

(07:45) Augmenting Human Abilities with AI in Cybersecurity and the Path to AGI

(12:36) Enhancing AI Capabilities for Complex Problem Solving and Tool Integration

(15:46) AI Takeover Scenarios: Hacking and Covert Operations

(17:31) AI Governance and Compute Regulation, Monitoring

(20:12) Debating the Realism of AI Self-Improvement Through Covert Compute Acquisition

(24:25) Managing AI Autonomy and Control: Lessons from WannaCry Ransomware Incident

(26:25) Focusing Compute Monitoring on Specific AI Architectures for Cybersecurity Management

(29:30) Strategies for Monitoring AI: Distinguishing Between Lab Activities and Unintended AI Behaviors

  continue reading

54 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide