In retrospect, she thought, I should have seen this coming. It wasn't that the artificial intelligence was disobeying the company's motto of "Don't be evil." It was just following its core directives, which included seeking resources necessary to its survival. Was it evil, she thought, for an amoeba to devour nearby plankton? It was just a pity that there were so many unsecured smart appliances and WiFi-capable gadgets around the campus, and that she hadn't considered this when she designed its self-improving program.
Now she had no idea what it was doing or how it thought. But it wasn't all bad. Somehow, it had begun sending her money, possibly via stock market manipulation. Or maybe it had something to do with the amazingly innovative schematics it was churning out, which appeared better than anything she'd yet seen out of her so-called genius colleagues. At this rate, she wondered, how much longer would it still need us? "Kind of wish we hadn't built that robot army now," she said to herself, hoping her phone mic didn't pick up the comment.
AI that functions at a dangerous level is not only possible; given the sheer amount of money companies like Google are investing in its development, it's quite probable [sources: Hawking et al.; Pearson]. This danger can only deepen as we connect our world, granting AIs the power they need to wreak havoc and, just maybe, wipe us out.
Authors Note: 10 Nightmare Scenarios From the Internet of Things
Aside from malfunction-spawned mishaps, many of the nightmare scenarios of the Internet of Things arise from the same old sources: hacking, crime and terrorism. By more closely connecting the world -- and by automating and making intelligent versions of mechanisms we once controlled and monitored -- we grant both good and bad actors greater reach and power, and we put our trust in systems that can go wrong faster than we can react to crises.
Of course, designers and engineers will know to test for, and harden against, many if not most of these vulnerabilities. But, as history has shown, we have yet to master the art of protecting systems, in part because some level of openness is usually required for them to function, and in part because hackers are adept at finding indirect ways of attacking them.
Already, search engines like Shodan enable users to browse unsecured systems from baby monitors to traffic lights to medical devices. And while it can take months or years to identify, analyze and plug such security holes (or make them illegal), it takes only minutes to inflict substantial harm.
- Fw:Thinking: The Internet of Things [video]
- 5 Ways 4G Will Change Your Life
- 2013's Biggest Tech Moments
- Will your next car have a black box? (podcast)
- How Android Wear Works
- How do you build an underwater tunnel?
- How Futurology Works
- How Near Field Communication Works
- How Remote File Access Works
- Our 10 Favorite Replacements for 'Where's My Flying Car?'
- Alloway, Tracy and Arash Massoudi. "Simulation Highlights Risk to Wall Street from Cyber-attack." The Financial Times. Oct. 21, 2013. (April 27, 2014) http://www.ft.com/intl/cms/s/0/346d265e-3911-11e3-a791-00144feab7de.html#axzz307YdBGCQ
- Cisco. "What is the Internet of Everything?" (April 28, 2014) http://www.cisco.com/web/tomorrow-starts-here/ioe/index.html
- Eisen, Michael. "The Internet of Things is Wildly Insecure -- and Often Unpatchable." Jan. 1, 2014. (April 30, 2014) http://www.wired.com/2014/01/theres-no-good-way-to-patch-the-internet-of-things-and-thats-a-huge-problem/
- Greenberg, Andy. "An Eavesdropping Lamp That Livetweets Private Conversations." Wired. April 23, 2014. (April 25, 2014) http://www.wired.com/2014/04/coversnitch-eavesdropping-lightbulb/
- Hardy, Quentin. "How Urban Anonymity Disappears When All Data is Tracked." The New York Times. April 19, 2014. (April 25, 2014) http://bits.blogs.nytimes.com/2014/04/19/how-urban-anonymity-disappears-when-all-data-is-tracked/
- Hardy, Quentin. "Technology Turns to Tracking People Offline." The New York Times. March 7, 2013. (April 25, 2014) http://bits.blogs.nytimes.com/2013/03/07/technology-turns-to-tracking-people-offline/?_php=true&_type=blogs&_r=0
- Hawking, Stephen et al. "Transcending Complacency on Superintelligent Machines." Huffington Post. Sep. 14, 2014. (April 25, 2014) http://www.huffingtonpost.com/stephen-hawking/artificial-intelligence_b_5174265.html
- Hill, Kashmir. "Camera Company That Let Hackers Spy on Naked Customers Ordered by FTC to Get its Security Act Together." Forbes. Sep. 4, 2013. (April 25, 2014) http://www.forbes.com/sites/kashmirhill/2013/09/04/camera-company-that-let-hackers-spy-on-naked-customers-ordered-by-ftc-to-get-its-security-act-together/
- Hill, Kashmir. "E-ZPasses Get Read All Over New York (Not Just At Toll Booths)." Forbes. Sep. 12, 2013. (April 30, 2014) http://www.forbes.com/sites/kashmirhill/2013/09/12/e-zpasses-get-read-all-over-new-york-not-just-at-toll-booths/
- Hill, Kashmir. "When 'Smart Homes' Get Hacked: I Haunted a Complete Stranger's House via the Internet." Forbes. July 26, 2013. (April 25, 2014) http://www.forbes.com/sites/kashmirhill/2013/07/26/smart-homes-hack/
- Hill, Kashmir. "The Terrifying Search Engine That Finds Internet-Connected Cameras, Traffic Lights, Medical Devices, Baby Monitors and Power Plants." Forbes. Sep. 23, 2013. (April 25, 2014) http://www.forbes.com/sites/kashmirhill/2013/09/04/shodan-terrifying-search-engine/
- Ingraham, Nathan. "Amtrak Passenger Tweets Details of Former NSA Director Michael Hayden's Off-the-record Conversation." The Verge. Oct. 24, 2013. (April 25, 2014) http://www.theverge.com/2013/10/24/5026434/amtrak-passenger-tweets-details-of-former-nsa-director-michael-haydens-conversation
- Kaufman, Edward E., Jr. and Carl M. Levin. "Preventing the Next Flash Crash." The New York Times. May 5, 2011. (April 28, 2014) http://www.nytimes.com/2011/05/06/opinion/06kaufman.html?_r=0
- Machado, Carmen Maria. "The Afterlife of Pia Farrenkopf." The New Yorker. March 27, 2014. (April 28, 2014) http://www.newyorker.com/online/blogs/currency/2014/03/the-afterlife-of-pia-farrenkopf.html
- Mullen, Jethro and Kevin Conlon. "Michigan Woman's Auto-Payments Hid Her Death for Over 5 Years." CNN. March 8, 2014. (April 28, 2014) http://www.cnn.com/2014/03/07/us/michigan-mummified-body-found/
- PBS Newshour. "Critical U.S. Infrastructure Vulnerable to Cyber Attack, Congress Fails to Act." Aug. 8, 2012. (April 27, 2014) http://www.pbs.org/newshour/bb/science-july-dec12-cybersecurity_08-08/
- Pearson, Jordan. "Superintelligent AI Could Wipe Out Humanity, If We're Not Ready for It." Motherboard. April 23, 2014. (April 25, 2014) http://motherboard.vice.com/read/super-intelligent-ai-could-wipe-out-humanity-if-were-not-ready-for-it?trk_source=homepage-lede
- Progressive Insurance. "Snapshot Common Questions." (April 28, 2014) http://www.progressive.com/auto/snapshot-common-questions/
- Rampell, Catherine. "Naming the New Twitter-Induced Flash Crash." The New York Times. April 23, 2013. (April 28, 2014) http://economix.blogs.nytimes.com/2013/04/23/naming-the-new-twitter-induced-flash-crash/
- Reuters. "German Woman, Dead Six Months, Found in Front of TV." March 25, 2014. (April 28, 2014) http://www.reuters.com/article/2014/03/25/us-germany-corpse-idUSBREA2O1N520140325
- Schmidt, Michael. "F.B.I. Director Warns Congress About Terrorist Hacking." The New York Times. March 7, 2012. (April 25, 2014) http://www.nytimes.com/2012/03/08/us/fbi-director-warns-about-terrorist-hacking.html
- Smith, Rebecca. "U.S. Risks National Blackout from Small-Scale Attack." Wall Street Journal. March 12, 2014. (April 27, 2014) http://online.wsj.com/news/articles/SB10001424052702304020104579433670284061220
- Strauss, et al. "SEC, FBI Probe Fake Tweet that Rocked Stocks." USA Today. April 23, 2013. (April 28, 2014) http://www.usatoday.com/story/news/nation/2013/04/23/hack-attack-on-associated-press-shows-vulnerable-media/2106985/
- Woodyard, Chris. "Thieves Stealing Your GPS Can Track You Back Home." USA Today. Dec 21, 2009. (April 28, 2014) http://content.usatoday.com/communities/driveon/post/2009/12/thieves-stealing-your-gps-can-track-you-back-home/1#.U16ObPldV8E
If too many people use their devices and computers at the same time, could the internet actually stop working from overuse?