II. While Reading Activities
- accustomed |əˈkəstəmd| adjective [attributive]-customary or usual: his accustomed route.
- undetectable |ˌəndəˈtektəb(ə)l| adjective –not able to be detected.
- white noise |ˌ(h)wīt ˈnoiz| nounPhysics noise containing many frequencies with equal intensities.
- stealthy |ˈstelTHē| adjective (stealthier, stealthiest) –behaving, done, or made in a cautious and surreptitious manner, so as not to be seen or heard: stealthy footsteps.
- Malicious |məˈliSHəs| adjective-characterized by malice; intending or intended to do harm: malicious destruction of property | the transmission of malicious software such as computer viruses.
- deceptions |dəˈsepSH(ə)n| noun- the action of deceiving someone: obtaining property by deception. a thing that deceives: a range of elaborate deceptions.
- exploit verb |ikˈsploit| [with object]–make full use of and derive benefit from (a resource): 500 companies sprang up to exploit this new technology.
- commercial |kəˈmərSHəl adjective–making or intended to make a profit: commercial products.
- subliminal |ˌsəbˈlimənl| adjective Psychology (of a stimulus or mental process) below the threshold of sensation or consciousness; perceived by or affecting someone’s mind without their being aware of it.
- invasion |inˈvāZHən| noun-an unwelcome intrusion into another’s domain: random drug testing of employees is an unwarranted invasion of privacy.
Source: New Oxford American Dictionary
- F- Researchers in China and the United States have begun demonstrating that they can send hidden commands.
- T-Apple’s Siri, Amazon’s Alexa and Google’s Assistant are the three major devices listed.
- T-In the wrong hands, the technology could be used to unlock doors, wire money or buy stuff online.
- F-Berkeley researchers published a research paper saying they could embed commands directly into recordings of music or spoken text.
- F-Nicholas Carlini is a fifth-year Ph.D. student in computer security at U.C. Berkeley.
- T-Mr. Carlini believes that malicious people already employ people to give hidden commands.
- T-The bottom line is that artificial intelligence can be tricked and manipulated.
- F-Smartphones and smart speakers that use digital assistants are set to outnumber people by 2021.
- T-Amazon said it has taken steps to ensure its Echo smart speaker is secure.
- T-There is already a history of smart devices being exploited for commercial gains through spoken commands.
This month, some of those Berkeley researchers published a research paper that went further, saying they could embed commands directly into recordings of music or spoken text. So while a human listener hears someone talking or an orchestra playing, Amazon’s Echo speaker might hear an instruction to add something to your shopping list.