{"id":4024,"date":"2018-08-22T12:02:43","date_gmt":"2018-08-22T10:02:43","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=4024"},"modified":"2023-08-06T21:47:52","modified_gmt":"2023-08-06T19:47:52","slug":"why-ai-is-a-threat-for-our-digital-security","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/22\/why-ai-is-a-threat-for-our-digital-security\/","title":{"rendered":"Why AI is a Threat for our Digital Security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Artificial intelligence has a great potential to improve many areas of our lives in the future. But what happens when these AI technologies are used maliciously?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sure, a big topic may be autonomous weapons or so called \u201ckiller robots\u201d. But beside our physical security &#8211; what about our digital one? How the malicious use of artificial intelligence will threaten and is already threatening our digital security, will be discussed in this blog post. <\/span><\/p>\n<p><!--more--><\/p>\n<p>Artificial intelligence is currently one of the most developing technologies and some might also say it\u2019s the \u2018next era of computing\u2019. And that\u2019s for a reason: at least since 2011 when deep learning was introduced as a concept for machine learning, the performance of applications using AI, e.g., for image recognition increased to a super-human-level. Easier access to big data and more computing power reinforced this trend as well.<\/p>\n<figure id=\"attachment_4026\" aria-describedby=\"caption-attachment-4026\" style=\"width: 656px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"4026\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/22\/why-ai-is-a-threat-for-our-digital-security\/human-level-image-recongition\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition.png\" data-orig-size=\"1296,907\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"human-level-image-recongition\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;\u00a9https:\/\/medium.com\/mmc-writes\/the-fourth-industrial-revolution-a-primer-on-artificial-intelligence-ai-ff5e7fffcae1&lt;\/p&gt;\n\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition-1024x717.png\" class=\"wp-image-4026 size-large\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition-1024x717.png\" alt=\"Computer image recognition has beaten human-level image recognition in 2015\" width=\"656\" height=\"459\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition-1024x717.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition-300x210.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition-768x537.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/human-level-image-recongition.png 1296w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><figcaption id=\"caption-attachment-4026\" class=\"wp-caption-text\">Source: https:\/\/medium.com\/mmc-writes\/the-fourth-industrial-revolution-a-primer-on-artificial-intelligence-ai-ff5e7fffcae1<\/figcaption><\/figure>\n<p>Still, AI didn\u2019t evolve it\u2019s real potential yet and there are lots of research areas that still need to be covered. One of the topics that has not gotten enough attention yet is security. And to express it even more specific: digital security.<\/p>\n<p>In this blog post I would like to give you a short overview about this unnoted but still important topic, i.e., how malicious use of AI already threatens our digital security and what we can expect within the next years.<\/p>\n<h3>Artificial Intelligence and the Curse of it\u2019s Dual Use Nature<\/h3>\n<p>There are plenty of projects using AI that are really made and used for the common good: <a href=\"https:\/\/www.cancerresearchuk.org\/funding-for-researchers\/how-we-deliver-research\/grand-challenge-award\/artificial-intelligence\">AI helps to prevent cancer<\/a>, <a href=\"https:\/\/de.sputniknews.com\/gesellschaft\/20180219319616478-ueberwachungskameras-kuenstliche-intelligenz-datenschutz-verbrechen-polizei-deutschland\/\">detects criminal activities,<\/a> <a href=\"https:\/\/www.gearbrain.com\/australia-drone-saves-swimmers-lives-2526777427.html\">helps to rescue drowning people<\/a>, etc. and there is hope that we will see a lot of more similar projects in the future as artificial intelligence offers the potential to perform almost any task that requires human (or animal) intelligence.<\/p>\n<p>But this potential is also the central issue. It\u2019s both a curse and a blessing as, sadly, we all know that human intelligence is not used for the common good only.<\/p>\n<blockquote><p>Just like the human brain, Artificial intelligence is a dual-use tool and there are and will always be people that abuse AI technologies for malicious use.<\/p><\/blockquote>\n<h2><\/h2>\n<p>&nbsp;<\/p>\n<h2>An Already Existing Threat:<br \/>\nMalicious Use of AI in Social Media<\/h2>\n<p>There are a lot of AI technologies that are already used maliciously and threatens our digital and political security. In the past years we experienced this trend especially in social media. Social media platforms give attackers both access to big data and a possibility to address people personally which might become a \u201ctoxic\u201d combination and creates an ideal base for an efficient attack.<\/p>\n<h3>1. Use of Data Mining \/ &nbsp;Profiling<\/h3>\n<p>It\u2019s no big news that social media platforms, particularly Facebook, earn money by using their users\u2019 data to generate and display, e.g., customized advertising with the help of intelligent algorithms. Whether this already counts as malicious use or not, this will not be discussed here. But a famous example how these AI technologies have already been abused to threaten the political security of the U.S. citizens (and not only them) is the case of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cambridge_Analytica\">Cambridge Analytica and its influence on the presidential elections 2016<\/a>. With the help of data mining for microtargeting Cambridge Analytica was able to possibly influence millions of american voters.<\/p>\n<figure id=\"attachment_4035\" aria-describedby=\"caption-attachment-4035\" style=\"width: 656px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"4035\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/22\/why-ai-is-a-threat-for-our-digital-security\/state-populations-affected-by-cambridge-analytica\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/state-populations-affected-by-cambridge-analytica.jpg\" data-orig-size=\"1201,1001\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"state-populations-affected-by-cambridge-analytica\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Source: https:\/\/www.businessinsider.de\/facebook-cambridge-analytica-affected-us-states-graphic-2018-6?r=US&amp;#038;IR=T&lt;\/p&gt;\n\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/state-populations-affected-by-cambridge-analytica-1024x853.jpg\" class=\"wp-image-4035 size-large\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/state-populations-affected-by-cambridge-analytica-1024x853.jpg\" alt=\"Between 17 and 50% of the US state population has been affected by Cambridge Analytica\" width=\"656\" height=\"546\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/state-populations-affected-by-cambridge-analytica-1024x853.jpg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/state-populations-affected-by-cambridge-analytica-300x250.jpg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/state-populations-affected-by-cambridge-analytica-768x640.jpg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/state-populations-affected-by-cambridge-analytica.jpg 1201w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><figcaption id=\"caption-attachment-4035\" class=\"wp-caption-text\">Source: https:\/\/www.businessinsider.de\/facebook-cambridge-analytica-affected-us-states-graphic-2018-6?r=US&amp;IR=T<\/figcaption><\/figure>\n<p>The work of Cambridge Analytica describes only one example how the malicious use of data mining or profiling can have a negative impact on security. Fake news or customized content (e.g., customized prices depending on user data) could be increased by it in the future as well.<\/p>\n<h3>2. Use of Natural Language Processing\/ Generation<\/h3>\n<p>Natural language processing and generation shows many different areas of application, e.g., translation and sentiment analysis on social media platforms. Where once expensive and time-consuming human work was required to synthesize or analyse texts can now be mastered within seconds by one intelligent algorithm. What may appear as a beneficial technology for many people can unfortunately also be abused for instance to automize SPAM or phishing attacks.<\/p>\n<p>The american security company ZeroFox already showed in their case study #SNAP_R how easy and lucrative this could be for attackers who abuse these technologies. By using a neural network for data mining and natural language generation they automatically generated customized \u201c@mention\u201d-Tweets containing phishing links.<\/p>\n<p>Details of the study can be found in their <a href=\"https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter.pdf\">presentation<\/a> but in essence #SNAP_R works as follows:<\/p>\n<ol>\n<li>Set up fake profiles<\/li>\n<li>Take a list of random Twitter users<\/li>\n<li>Evaluate users\u2019 vulnerability<\/li>\n<li>Collect data about most vulnerable users (topics, bag of words etc.)<\/li>\n<li>Feed the neural network with data<\/li>\n<li>Generate and post \u201c@mention\u201d Tweets with phishing link<\/li>\n<\/ol>\n<figure id=\"attachment_4036\" aria-describedby=\"caption-attachment-4036\" style=\"width: 820px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"4036\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/22\/why-ai-is-a-threat-for-our-digital-security\/machine-generated-tweet\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/machine-generated-tweet.png\" data-orig-size=\"820,178\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"machine-generated-tweet\" data-image-description=\"&lt;p&gt;#SNAP_R machine generated tweet&lt;\/p&gt;\n\" data-image-caption=\"&lt;p&gt;Source: https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter-wp.pdf&lt;\/p&gt;\n\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/machine-generated-tweet.png\" class=\"size-full wp-image-4036\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/machine-generated-tweet.png\" alt=\"\" width=\"820\" height=\"178\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/machine-generated-tweet.png 820w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/machine-generated-tweet-300x65.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/machine-generated-tweet-768x167.png 768w\" sizes=\"auto, (max-width: 820px) 100vw, 820px\" \/><figcaption id=\"caption-attachment-4036\" class=\"wp-caption-text\">Source: https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter-wp.pdf<\/figcaption><\/figure>\n<p>The result is impressive: after 2 days they achieved a 30 &#8211; 66% click-through-rate (the percentage is vage as they can\u2019t be sure whether all clicks came from real persons or from other bots).<\/p>\n<blockquote><p>Using a neural network to generate phishing attacks will be both time and (probably) money saving combined with a high efficiency &#8211; a dream for every attacker.<\/p><\/blockquote>\n<p>Very probably we will see a lot of intelligent and automated phishing, SPAM or social engineering attacks using artificial intelligence in the future.<\/p>\n<p>&nbsp;<\/p>\n<h2>New Threats:<br \/>\nMultimedia Generation and Manipulation<\/h2>\n<p>Audio, image and video data have become an essential part of our digital communication. Artificial intelligence has already been used very early to help us dealing with media data in different kinds of ways, e.g., object recognition or media interpretation in general. Recently, also media manipulation and generation technologies have shown up rising new possibilities but also questions for our digital security.<\/p>\n<h3>1. Audio and Speech Generation<\/h3>\n<p>The possibility to let Siri, Alexa and Co. read every possible text is nothing new to us but how great would it be to let your favorite voice actor read all your files for you instead? The current AI technology is not as far from that! In 2016 Adobe already presented their software <a href=\"https:\/\/www.youtube.com\/watch?v=I3l4XLZ59iw\">Voco<\/a> that might be capable to do exactly this (however in the moment there are no news about when or whether the software will be released). But also the canadian start up L<a href=\"https:\/\/lyrebird.ai\/\">yrebird<\/a> makes it possible to create a vocal avatar &#8211; &nbsp;\u201c<em>a digital voice that sounds like you with only one minute of audio<\/em>\u201d. Although the results still sound kind of artificial it\u2019s just a matter of time when the technology will have developed to a deceptively realistic level.<\/p>\n<p>Not only speech generation is already possible yet but also generation of sounds. A research group of the MIT shows how \u201c<a href=\"https:\/\/www.youtube.com\/watch?v=0FW99AQmMc8&amp;feature=youtu.be&amp;t=1m4s\">Visually-Indicated Sounds<\/a>\u201d can be created with the help of machine learning. It \u201cgenerates\u201d appropriate sounds of a drum stick just by giving a video as input to a neural network (for more information I really recommend watching their <a href=\"https:\/\/www.youtube.com\/watch?v=0FW99AQmMc8&amp;feature=youtu.be&amp;t=1m4s\">video<\/a> or reading the <a href=\"https:\/\/arxiv.org\/abs\/1512.08512\">paper<\/a> of the project).<\/p>\n<p>No doubt, these are impressive examples, how AI can be used for audio generation in the future. But what does this mean for our digital security?<\/p>\n<p>Unfortunately a technology that is capable of putting any possible words in the mouth of your own digital voice is also capable of doing this for any other person&#8217;s voice. So with just a small amount of original audio recordings of a targeted person, it will be easy to abuse this technology to spread audio-based fake news or to use it for social engineering (especially phone frauds).<br \/>\nAt the Black Hat Conference 2018, John Seymour und Azeem Aqil showed in their presentation \u201c<a href=\"http:\/\/i.blackhat.com\/us-18\/Thu-August-9\/us-18-Seymour-Aqil-Your-Voice-Is-My-Passport.pdf\">Your Voice is My Password<\/a>\u201d that it\u2019s already possible to use AI based technologies to outsmart voice authentication. Examples like this put the future of biometric authentication into question.<\/p>\n<p>In general it will be almost impossible for humans to differ real from fake recordings in the future and it will be a big challenge for the IT security to find ways how at least machines can detect the difference.<\/p>\n<h3>2. Image Generation<\/h3>\n<p>In times of Photoshop, etc. image manipulation is nothing new to us but machine learning based algorithms now enables us to generate completely new images. Here is an example: could you tell which one of these images is a photo of a real existing person and which one is just generated with the help of a <a href=\"http:\/\/openaccess.thecvf.com\/content_cvpr_2017\/papers\/Ledig_Photo-Realistic_Single_Image_CVPR_2017_paper.pdf\">Generative Adversarial Network by Ledig et al.<\/a>?<\/p>\n<figure id=\"attachment_4044\" aria-describedby=\"caption-attachment-4044\" style=\"width: 656px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"4044\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/22\/why-ai-is-a-threat-for-our-digital-security\/real-and-fake-portrait\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/real-and-fake-portrait.png\" data-orig-size=\"1133,557\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"real-and-fake-portrait\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Source:&lt;br \/&gt;\nhttps:\/\/arxiv.org\/abs\/1710.10196 ,&lt;br \/&gt;\nhttps:\/\/cdn.playbuzz.com\/cdn\/\/9ced2191-d73f-4e3e-9181-824046fac4ed\/2bda590b-182b-4c67-8793-8ffc1bd8b9ea.jpg&lt;\/p&gt;\n\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/real-and-fake-portrait-1024x503.png\" class=\"size-large wp-image-4044\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/real-and-fake-portrait-1024x503.png\" alt=\"\" width=\"656\" height=\"322\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/real-and-fake-portrait-1024x503.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/real-and-fake-portrait-300x147.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/real-and-fake-portrait-768x378.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/real-and-fake-portrait.png 1133w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><figcaption id=\"caption-attachment-4044\" class=\"wp-caption-text\">Source:<br \/>https:\/\/arxiv.org\/abs\/1710.10196 ,<br \/>https:\/\/cdn.playbuzz.com\/cdn\/\/9ced2191-d73f-4e3e-9181-824046fac4ed\/2bda590b-182b-4c67-8793-8ffc1bd8b9ea.jpg<\/figcaption><\/figure>\n<p>Here is the answer:<\/p>\n<p>The left one is a photo of the mexican singer Luis Coronel and the other one is just a fictive person.<\/p>\n<p>It\u2019s most probable that in the next years it will be not only possible to generate high resolution images of portraits but also of places, objects, animals and everything one can imagine. What might be great for the stock photo industry or image rights in general, might be used maliciously to create content for fake profiles and to make fake news look more plausible. In the end we will have to face the question: How can we differ real from fake images in the future? Again, a big challenge for the IT security.<\/p>\n<h3>3. Video Generation and Manipulation<\/h3>\n<p>If we can already generate and manipulate audio and image data it\u2019s not surprising that also new AI based video manipulating technologies have come up in the last years. The research project <a href=\"http:\/\/niessnerlab.org\/papers\/2016\/1facetoface\/thies2016face.pdf\">Face2Face<\/a> by the University of Erlangen-Nuremberg, the Max-Planck-Institute for Informatics and the Stanford University shows how easy it is to manipulate a person\u2019s facial expression in a video, even in real time (<a href=\"https:\/\/www.youtube.com\/watch?v=ohmajJTcpNk&amp;feature=youtu.be&amp;\">here<\/a> is their demonstration video).<\/p>\n<figure id=\"attachment_4051\" aria-describedby=\"caption-attachment-4051\" style=\"width: 300px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.youtube.com\/watch?v=jI6H-0YWkSc&amp;feature=youtu.be\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"4051\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/22\/why-ai-is-a-threat-for-our-digital-security\/video-with-deep-fake\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/Video-with-deep-fake.png\" data-orig-size=\"1294,608\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Video-with-deep-fake\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Source: https:\/\/www.youtube.com\/watch?v=jI6H-0YWkSc&amp;#038;feature=youtu.be&lt;\/p&gt;\n\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/Video-with-deep-fake-1024x481.png\" class=\"size-medium wp-image-4051\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/Video-with-deep-fake-300x141.png\" alt=\"\" width=\"300\" height=\"141\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/Video-with-deep-fake-300x141.png 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/Video-with-deep-fake-768x361.png 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/Video-with-deep-fake-1024x481.png 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/Video-with-deep-fake.png 1294w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-4051\" class=\"wp-caption-text\">Source: https:\/\/www.youtube.com\/watch?v=jI6H-0YWkSc&amp;feature=youtu.be<\/figcaption><\/figure>\n<p>Also face swapping in videos, so called <a href=\"https:\/\/en.wikipedia.org\/wiki\/Deepfake\">Deep Fakes, <\/a>have gone viral and can be created easily just by using a software called FakeApp (however it seems their Website has been turned down since June 18).<\/p>\n<p>&nbsp;<\/p>\n<p>Especially in combination with speech generation, these technologies can become really dangerous for our security when used maliciously. They open doors for highly deceptive fake news videos: either to change only some significant details, e.g., in a politician interview with the help of Face2Face and voice generation, or to create a whole new video and map a target person\u2019s face into it with Deep Fakes. And what will happen with credibility of video evidence?<\/p>\n<blockquote><p>We will have to overthink our \u201cseeing is believing\u201d mindset.<\/p><\/blockquote>\n<p>Again it will be a big challenge for the IT to find a way how we could mitigate this problem.<\/p>\n<h3>In a Nutshell &#8211; What can we expect in the next years?<\/h3>\n<p>In summary, both existing and new threats will probably lead to the following problems in the next years:<\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Attacks will become: <\/span>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">more automated<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">finely targeted<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">more effective<\/span><\/li>\n<\/ol>\n<\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Personal data will be used and abused more than ever<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Distinction between real and fake content will be almost impossible for humans<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Fake news will be a bigger challenge than ever before &#8211; A small group of people will be able to manipulate the public opinion (e.g., case Cambridge Analytica)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Biometric authentication might become insecure<br \/>\n<\/span><\/li>\n<\/ol>\n<h2>How can we mitigate or even prevent the threats?<\/h2>\n<p>First of all, when dealing with dual-use technologies there is no real solution how to prevent them from being abused. The only way would be to prohibit the malicious use of it, which might somehow be promising for material or expert-knowledge required technologies like nuclear energy. But in the end a trained neural network is just a small file and can easily be distributed and adapted to be used even by laypersons. Additionally, it\u2019s quite subjective what counts as malicious use of AI and what not, so a prohibition would be hard to draft in the first place.<\/p>\n<p>Nevertheless, there is a lot we can do to mitigate the threats. Here are some suggestions depending on the different roles that are involved.<\/p>\n<h4>1. User<\/h4>\n<p>In simple terms: the less people fall for fake news &#8211; the less fake news will be \u201cproduced\u201d. So what one can do as a user is:<\/p>\n<ul>\n<li>Refocus on the \u201creal\u201d threats of AI (remember: AI is not only about killer robots)<\/li>\n<li>Call attention<\/li>\n<li>Be more careful using personal data<\/li>\n<li>Participate in the fight against fake news<\/li>\n<li>Use your rights (e.g., when your personal data is used unjustified)<\/li>\n<\/ul>\n<h4>2. Governments \/ Institutions\/ Corporations<\/h4>\n<p>The government and institutions can have a big positive influence on the fight against the threats. What they can do is:<\/p>\n<ol>\n<li>Support more collaboration with technical researchers<\/li>\n<li>Create ethical standards<\/li>\n<li>Support <a href=\"https:\/\/futureoflife.org\/2017\/12\/27\/research-for-beneficial-artificial-intelligence\/\">Beneficial Intelligence<\/a><\/li>\n<li>(Re)inform\/ educate about the threats<\/li>\n<li>Provide platforms to report fake news<\/li>\n<li>Extend privacy protection<\/li>\n<li>Consider industry centralization \/ centralized blacklisting<\/li>\n<\/ol>\n<h4>3. AI Developer \/ AI Researcher<\/h4>\n<p>Of course the majority of AI developer do not have any malicious intents when working on a new project. However, we have to keep in mind: \u201cWith Great Power Comes Great Responsibility\u201d. And in detail we should:<\/p>\n<ol>\n<li>Take the dual-use nature of one\u2019s work seriously<\/li>\n<li>Call attention<\/li>\n<li>Comply with ethical standards<\/li>\n<li>Limit the network on the task it is intended for (<a href=\"https:\/\/futureoflife.org\/2017\/12\/27\/research-for-beneficial-artificial-intelligence\/\">Undirected intelligence vs. directed intelligence <\/a>)<\/li>\n<li>Show failure transparency<\/li>\n<li>Consider whether the code should be made open source or not (open source is great but there might be some edge cases where it might be better to limit the source)<\/li>\n<\/ol>\n<h4>4. Security Developer\/ Security Researcher<\/h4>\n<p>In the end there is a risk of attacks and security developer\/researcher will be needed to mitigate the problems. To be prepared for this they should:<\/p>\n<ol>\n<li>Initiate collaborations (e.g. <a href=\"http:\/\/www.fakenewschallenge.org\/\">FakeNewsChallenge<\/a> )<\/li>\n<li>Use Game Days \/ White Hat Hacking with focus on AI-attacks<\/li>\n<li>Use AI against AI\n<ol>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Adversarial_machine_learning\">Adversarial Machine Learning<\/a><\/li>\n<li>E.g., <a href=\"https:\/\/en.wikipedia.org\/wiki\/2016_Cyber_Grand_Challenge\">Cyber Grand Challenge<\/a><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>And at this point I would like to propose some research questions:<\/p>\n<ol>\n<li><em>To what extent can the malicious use of AI already be mitigated in the architecture of the network?<\/em><\/li>\n<li><em>How can AI be used to detect multimedia fake news ?<\/em><\/li>\n<li><em>To what extent can technical measures certify the authenticity of video, images and audio data?<\/em><\/li>\n<li><em>What impact will the expansion of image- and sound-generation have on the future of authentication?<\/em><\/li>\n<\/ol>\n<p>More interesting but also quite detailed research questions have been formulated by the<a href=\"https:\/\/futureoflife.org\/\"> Future of Life institute<\/a> and can be found <a href=\"https:\/\/futureoflife.org\/data\/documents\/research_survey.pdf\">here<\/a>.<\/p>\n<h2>Conclusion:<\/h2>\n<p>The malicious use of artificial intelligence will become a difficult problem in the following years for our digital and political security. Especially users of social networks will have to deal with influence campaigns, spear phishing and particularly fake news. We will have to question the authenticity of audio, image and video data and can no longer believe in what we see or hear.<\/p>\n<p>However it lies in our hands to influence how strong the threats will actually become. Most of all it\u2019s important to call attention of the threats and to initiate prevention measures. AI developers should be aware of their responsibility and the government should support security research.<\/p>\n<p>Artificial intelligence is a great chance but we should remember Stephen Hawking\u2019s words:<\/p>\n<blockquote><p>\u201cArtificial Intelligence will be either the best or worst thing for humanity.&#8221;<\/p><\/blockquote>\n<p>\u2026 and it is up to us in which direction things will develop.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h3>Sources &amp; References<\/h3>\n<p>A big part of this blog post has references to the great report \u201c<a href=\"https:\/\/arxiv.org\/pdf\/1802.07228.pdf\">The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation<\/a>\u201d (Miles Brundage et al., 2017) from the University of Oxford.<\/p>\n<p>Other resources and references are:<\/p>\n<ol>\n<li>#SNAP_R by ZeroFox &#8211; Weaponizing Data Science for Social Engineering.<br \/>\nURL: &nbsp;<a href=\"https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter.pdf\">https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-Automated-E2E-Spear-Phishing-On-Twitter.pdf<\/a> &nbsp;[Accessed 2018-05-06]<\/li>\n<li>State Population affected by Cambridge Analytica: <a href=\"https:\/\/www.businessinsider.de\/facebook-cambridge-analytica-affected-us-states-graphic-2018-6?r=US&amp;IR=T\">https:\/\/www.businessinsider.de\/facebook-cambridge-analytica-affected-us-states-graphic-2018-6?r=US&amp;IR=T <\/a>&nbsp;[Accessed 2018-05-06]<\/li>\n<li>Lyrebird: &nbsp;<a href=\"https:\/\/lyrebird.ai\/vocal-avatar\">https:\/\/lyrebird.ai\/vocal-avatar <\/a>[Accessed 2018-05-06]<\/li>\n<li>Visually Indicated Sounds, Andrew Owens et al., 2015: &nbsp;<a href=\"https:\/\/arxiv.org\/abs\/1512.08512\">https:\/\/arxiv.org\/abs\/1512.08512 <\/a>&nbsp;[Accessed 2018-05-06]<\/li>\n<li>Image Luis Coronel <a href=\"https:\/\/cdn.playbuzz.com\/cdn\/\/9ced2191-d73f-4e3e-9181-824046fac4ed\/2bda590b-182b-4c67-8793-8ffc1bd8b9ea.jp\">https:\/\/cdn.playbuzz.com\/cdn\/\/9ced2191-d73f-4e3e-9181-824046fac4ed\/2bda590b-182b-4c67-8793-8ffc1bd8b9ea.jp<\/a>g [Accessed 2018-05-12]<\/li>\n<li>Progressive Growing of GANs for Improved Quality, Stability, and Variation, Tero Karras et al, 2017 URL: <a href=\"https:\/\/arxiv.org\/abs\/1710.10196\">https:\/\/arxiv.org\/abs\/1710.10196<\/a> &nbsp;[Accessed 2018-05-06]<\/li>\n<li>Face2Face: Real-time Face Capture and Reenactment of RGB Videos (CVPR 2016 Oral) &nbsp;URL: <a href=\"https:\/\/www.youtube.com\/watch?v=ohmajJTcpNk&amp;feature=youtu.be&amp;t=53s\">https:\/\/www.youtube.com\/watch?v=ohmajJTcpNk&amp;feature=youtu.be&amp;t=53s &nbsp;<\/a>Accessed 2018-05-06]<\/li>\n<li>Fake News Challenge, URL: http:\/\/www.fakenewschallenge.org\/ [Accessed 2018-05-30]<\/li>\n<li>Future of Life Institute URL:<a href=\"https:\/\/futureoflife.org\/\"> https:\/\/futureoflife.org\/<\/a> [Accessed 2018-05-12]<\/li>\n<li>Tech Trends Report 2018: URL: <a href=\"https:\/\/futuretodayinstitute.com\/2018-tech-trends-annual-report\/\">https:\/\/futuretodayinstitute.com\/2018-tech-trends-annual-report\/ <\/a>&nbsp;[Accessed 2018-05-12]<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence has a great potential to improve many areas of our lives in the future. But what happens when these AI technologies are used maliciously? Sure, a big topic may be autonomous weapons or so called \u201ckiller robots\u201d. But beside our physical security &#8211; what about our digital one? How the malicious use of [&hellip;]<\/p>\n","protected":false},"author":885,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[652,664,26,651],"tags":[106,27,126],"ppma_author":[763],"class_list":["post-4024","post","type-post","status-publish","format-standard","hentry","category-artificial-intelligence","category-ethics","category-secure-systems","category-system-designs","tag-artificial-intelligence","tag-security","tag-threats"],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1017,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2016\/07\/25\/machine-learning-in-secure-systems\/","url_meta":{"origin":4024,"position":0},"title":"Machine Learning in secure systems","author":"Claudius Messerschmidt","date":"25. July 2016","format":false,"excerpt":"Sadly today's security systems often be hacked and sensitive informations get stolen. To protect a company against cyber-attacks security experts define a \"rule set\" to detect and prevent any attack. This \u201canalyst-driven solutions\u201d are build up from human experts with their domain knowledge. This knowledge is based on experiences and\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_robot_landscape.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_robot_landscape.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_robot_landscape.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2016\/07\/Machine_learning_SeSy_robot_landscape.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10415,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2020\/08\/19\/ai-cyberattacks-deepfakes\/","url_meta":{"origin":4024,"position":1},"title":"The Dark Side of AI &#8211; Part 1: Cyberattacks and Deepfakes","author":"Micha Christ","date":"19. August 2020","format":false,"excerpt":"Introduction Who hasn't seen a cinema production in which an AI-based robot threatens individual people or the entire human race? It is in the stars when or if such a technology can really be developed. With this series of blog entries we want to point out that AI does not\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/screen-shot-2018-08-03-at-10-34-32-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/screen-shot-2018-08-03-at-10-34-32-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2020\/08\/screen-shot-2018-08-03-at-10-34-32-1.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":2615,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/08\/27\/fooling-the-intelligence\/","url_meta":{"origin":4024,"position":2},"title":"FOOLING THE INTELLIGENCE","author":"Jonas Miederer","date":"27. August 2017","format":false,"excerpt":"Adversarial machine learning and its dangers The world is led by machines, humans are subjected to the robot\u2019s rule. Omniscient computer systems hold the control of the world. The newest technology has outpaced human knowledge, while the mankind is powerless in the face of the stronger, faster, better and almighty\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/AAEAAQAAAAAAAAxmAAAAJDcyNzkyZjkzLTUzZTEtNGU1ZS04OWYxLWU4NDU5Y2QxOTRjYQ.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/AAEAAQAAAAAAAAxmAAAAJDcyNzkyZjkzLTUzZTEtNGU1ZS04OWYxLWU4NDU5Y2QxOTRjYQ.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/AAEAAQAAAAAAAAxmAAAAJDcyNzkyZjkzLTUzZTEtNGU1ZS04OWYxLWU4NDU5Y2QxOTRjYQ.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/AAEAAQAAAAAAAAxmAAAAJDcyNzkyZjkzLTUzZTEtNGU1ZS04OWYxLWU4NDU5Y2QxOTRjYQ.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/08\/AAEAAQAAAAAAAAxmAAAAJDcyNzkyZjkzLTUzZTEtNGU1ZS04OWYxLWU4NDU5Y2QxOTRjYQ.png?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":3803,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/09\/12\/autonomous-war-what-dangers-are-associated-with-warfare-without-human-intervention\/","url_meta":{"origin":4024,"position":3},"title":"Autonomous War &#8211; Which dangers are associated with warfare without human intervention?","author":"Alexander Sch\u00fcbl","date":"12. September 2018","format":false,"excerpt":"The term autonomous war has been a controversial topic for years. But what exactly does the term actually mean? Autonomous war means the use of autonomous lethal weapons (short: LAWs) and machines or vehicles, which are primarily used by the military for modern warfare. Autonomous weapon systems can decide independently\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/samsung.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/samsung.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/samsung.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":26389,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2024\/07\/26\/transforming-it-operations-is-aiops-the-future-of-enterprise-it\/","url_meta":{"origin":4024,"position":4},"title":"Transforming IT Operations: Is AIOps the Future of Enterprise IT?","author":"Milena Hristova","date":"26. July 2024","format":false,"excerpt":"Now more than ever, enterprises are always on the lookout for new ways to implement artificial intelligence algorithms across various sectors as they strive to remain competitive. AI is changing the way businesses operate, from automating routine tasks to making data-driven decisions like in the example of the Digital Twin.\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/image-2.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/image-2.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2024\/07\/image-2.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":28304,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2026\/02\/08\/ai-security-leveraging-ai-for-security-automation\/","url_meta":{"origin":4024,"position":5},"title":"AI Security &#8211; Leveraging AI for Security automation","author":"Nico Giaquinta","date":"8. February 2026","format":false,"excerpt":"Dieser Blogpost wurde f\u00fcr das Modul Enterprise IT (113601a) verfasst. Lesezeit: 5 Minuten In der heutigen IT-Landschaft ist Cybersicherheit unausweichlich. Tausende Alerts, unz\u00e4hlige Logs und verd\u00e4chtige Aktivit\u00e4ten m\u00fcssen in Echtzeit analysiert werden. Traditionelle Sicherheitssysteme mit definierten Regeln sto\u00dfen an ihre Grenzen.Die Herausforderung: sich selbst verbreitende Ransomware, Phishing-Kampagnen mit Deepfakes und\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":763,"user_id":885,"is_guest":0,"slug":"ks188","display_name":"Katharina Strecker","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/39e8a77b653392b5f7b08b9762c5ab75a2e689841f0bd6ad52771561f2faee1a?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/4024","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/885"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=4024"}],"version-history":[{"count":29,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/4024\/revisions"}],"predecessor-version":[{"id":25467,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/4024\/revisions\/25467"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=4024"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=4024"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=4024"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=4024"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}