logo
episode-header-image
May 2023
39m 9s

Babbage: What if generative AI destroys ...

The Economist
About this episode

Recent years have seen a boom in biometric security systems—identification measures based on a person’s individual biology—from unlocking smartphones, to automating border controls. As this technology becomes more prevalent, some cybersecurity researchers are worried about how secure biometric data is—and the risk of spoofs. If generative AI becomes so powerful and easy-to-use that deepfake audio and video could hack into our security systems, what can be done? 


Bruce Schneier, a security technologist at Harvard University and the author of “A Hacker’s Mind”, explores the cybersecurity risks associated with biometrics, and Matthias Marx, a security researcher, discusses the consequences of bad actors obtaining personal data. If artificial intelligence could overcome security systems, human implants may be used as authentication, according to Katina Michael, a professor at Arizona State University. Plus, Joseph Lindley, a design academic at Lancaster University, proposes how security systems can be better designed to avoid vulnerabilities. To think about practical solutions, Scott Shapiro, professor at Yale Law School and author of “Fancy Bear Goes Phishing”, puts generative AI into the wider context of cybersecurity. Finally, Tim Cross, The Economist’s deputy science editor, weighs up the real-world implications of our thought experiment. Kenneth Cukier hosts.


Learn more about detecting deepfakes at economist.com/detecting-deepfakes-pod, or listen to all of our generative AI coverage at economist.com/AI-pods.


For full access to The Economist’s print, digital and audio editions subscribe at economist.com/podcastoffer and sign up for our weekly science newsletter at economist.com/simplyscience.



Hosted on Acast. See acast.com/privacy for more information.

Up next
Today
That warm buzzy feeling: malaria and climate change
As temperatures climb, mosquitoes will migrate to places where natural resistance to malaria is lower. More and more severe natural disasters will make for more breeding grounds. How to stop a deadly disease getting deadlier? In China’s cut-throat food-delivery war, absolutely no ... Show More
24m 43s
Aug 22
Rule and divide: opposition grows in Syria
Less than nine months after Syria’s dictator Bashar al-Assad was toppled, the honeymoon is over. How is the new regime responding to rising dissent? Introducing Britain’s revolutionary retirees: why pensioners increasingly dominate political protest. And celebrating the life of o ... Show More
23m 38s
Aug 21
Stake and chips: will America take 10% of Intel?
Intel was once synonymous with chip-making, but in recent years it has fallen behind. Now the Trump administration may become its biggest shareholder. A political assassination in Colombia raises fears about a return to violence. And what an annual snail race tells us about rural ... Show More
21m 2s
Recommended Episodes
May 2024
AI Is a Cybersecurity Tool and Threat
When it comes to cybersecurity, artificial intelligence is proving to be both a formidable defensive tool and a potential threat. Today, Patrick Hevesi, VP Analyst with Gartner for Technical Professionals, discusses the concept and implications of “dark AI.” He also highlights pr ... Show More
26m 19s
Jul 2023
How much should we fear artificial intelligence?
Scientists have been sounding the alarm about the potentially catastrophic dangers posed by artificial intelligence. Gideon talks to Anu Bradford, professor at Columbia University and author of a forthcoming book on the global battle to regulate technology about the different app ... Show More
29m 57s
Jul 2021
Analyzing the Impact of A.I. and Technology on Society and Cybersecurity
Technology is advancing at pace never seen before and the newest tech, applications and widgets are being widely adopted at an even quicker rate. Just look at A.I. and machine learning tools,which are now used to identify things once thought unimaginable — whether it's to figure ... Show More
49m 58s
Jul 2023
How Confidential Computing Will Unlock Generative AI for Enterprise
In this episode, we delve into the transformative potential of generative AI and the new security challenges it presents, exploring how confidential computing provides a novel solution to these concerns. Discover how this innovative technology is revolutionizing data security, fo ... Show More
9m 21s
Jun 2023
Could artificial intelligence lead to human extinction?
Artificial intelligence is a powerful technology that can transform human lives but industry leaders warn that the tool they built could one day pose an existential threat to humanity. So, how can governments regulate AI without stifling innovation?  Join host Mohammed Jamjoom. G ... Show More
24m 33s
Mar 2024
Babbage: The science that built the AI revolution—part one
What is intelligence? In the middle of the 20th century, the inner workings of the human brain inspired computer scientists to build the first “thinking machines”. But how does human intelligence actually relate to the artificial kind? This is the first episode in a four-part ser ... Show More
42m 57s
Oct 2023
AI Threats & Opportunities in Cyber Security With Material Security Co-Founder Ryan Noon
Cyber Security is going to change significantly in the era of AI, according to Ryan Noon, cofounder of Material Security, a security company that makes cloud-based Google and Microsoft email a safe place for sensitive data. Elad Gil and Ryan talk about how Material Security start ... Show More
36m 22s
May 2023
Is artificial intelligence a threat or a breakthrough?
After ‘The Godfather’ of artificial intelligence sounds the alarm about his own dangerous creation, Christiane asks senior A.I. researcher Connor Leahy, and also the head of Cyber Policy at Stanford University Marietje Schaake, if they think A.I. is a major threat to humanity, or ... Show More
54m 57s
Oct 2017
Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups.
In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observ ... Show More
16m 45s
Oct 2018
Influence operations, da. Direct hacking? Maybe nyet. Chalubo botnet borrows old tricks. Financial sector alert in Mexico. Airline breach disclosed. Lawsuits over privacy. ICS Security notes.
In today's podcast, we hear that the US Department of Homeland Security sees lower-than-expected rates of Russian election system probing even as Russian information operations continue. Sophos warns of the emergence of the Linux-based "Chalubo" botnet. Mexico's Central Bank rais ... Show More
20m 12s