Description
Book SynopsisTable of ContentsIntroduction xi
1 Artificial Social Intelligence 1
2 Social Engineering and Psychological Exploitation 19
3 A History of Technology and Social Engineering 53
4 A History of Language Modeling 83
5 Consciousness, Sentience, and Understanding 127
6 The Imitation Game 151
7 Weaponizing Social Intelligence 175
8 Weaponizing Technical Intelligence 215
9 Multimodal Manipulation 239
10 The Future 257
11 The Quest for Resolution 283
Appendix A: Bot Automation 295
Appendix B: LLM Pretext Engineering 303
Appendix C: CAPTCHA Bypass 317
Appendix D: Context Manipulation Attacks 321
Appendix E: Attack Optimization with Monte Carlo Simulations 333
Appendix F: Autonomous C2 Operations with LLMs 349
Appendix G: Disembodiment Attacks 353
Bibliography 357
Acknowledgments 373
About the Author 375
Index 377