Following the news about Ghost in the Shell releases in cinemas across the UK, this futuristic sci-fi fantasy explores the realms and evolution of artificial intelligence and the power of the synergy between man and machine. Gunter Ollmann, CSO at Vectra Networks commented below.
Gunter Ollmann, CSO at Vectra Networks:
“Just as Ghost in the Shell took its inspiration from Arthur Koestler’s Ghost in the Machine with his thoughts behind the mind-body relationship, recent advancements in security technology see AI taking over much of the ‘muscle-memory’ work of repetitive investigation and response processes.
“The premise of Ghost in the Shell is that the mind-body connection is a two-way street and hacking one leads to control of the other. While machine intelligence it still in its infancy of deployment, it is already being attacked and controlled against its owners wishes. The fictional realm of the Niihama Prefecture and the ‘Major’s’ vulnerabilities to hacking and subversion have become more real over the years since the original manga’s plot conception back in 1989.
“In a world of rapidly diversifying threats and ever-growing attacks, AI is building an automated front-line security analyst in software that never sleeps and relentlessly hunts for active threats. In a similar way, ‘Major’ relentlessly seeks to complete her mission in Ghost in the Shell. She grasps and enables the best of both human and cyborg worlds – operating faster with the benefit of a global field of intelligence from which she can make more informed decisions.
“By focusing on behaviours – ‘what things do’ – rather than signatures – ‘what they are’, we can gain more understanding of the film. Each behaviour of ‘Majors’ character has a dedicated machine learning algorithm, either supervised (pre-trained with example data before deployment) or unsupervised (completely self-trained from deployment), these algorithms then feed additional analytical layers to provide integrated intelligence, from which she learns.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.