Are We Really Safe From Self-Aware Robots?

CAohRcJUwAAyQiI.jpg

 

End-of-mankind predictions about artificial intelligence, which have issued from some of today’s most impressive human intellects, including Stephen Hawking, Elon Musk, Bill Gates, Steve Wozniak and other notables, have generally sounded overly alarmist to me, exhibiting a bit more fear-of-the-unknown than I would have expected from such eminences, especially the scientists. But that was before I saw reports on the self-aware robot.

The reports, including a recent piece in New Scientist  http://bit.ly/iCubNS  tell of a breakthrough in artificial intelligence. A robot was able to figure out a complex puzzle that required it to recognize its own voice and to extrapolate the implications of that realization. (Shorthand version: Three robots were told that two of them had been silenced and they needed to determine which one had not been. All three robots tried saying “I don’t know,” but only one could vocalize. Once that robot heard the sound of its own voice saying, “I don’t know,” it changed its answer and said that it was the one robot that had not been silenced.)

What’s noteworthy is that this same test had been given to these same robots many times before, and this was the first time that one of these self-learning robots figured it out. 

The classic argument against the robot takeover of the world is that while computers can go haywire, think the Windows operating system on almost any given day, so can humans. That’s undeniable, but society has established some extensive checks-and-balances that limit how much damage any one person can do. The military has a chain of command, and killers on a shooting spree are eventually stopped, either by the police or bystanders. Consider 9/11. Although terrorists flying planes into buildings was unexpected, as soon as the nature of the attack became apparent, all US aircraft were grounded.
But our reliance on computers to assist us and even take control just keeps increasing, and today machine intelligence is integral to military weapons systems, nuclear power plants, traffic signals, wireless-equipped cars, aircraft and more. One of our greatest fears now is that terrorists will gain control over any such key computer systems. But an even greater threat might be that the machines themselves gain the upper hand through artificial intelligence and wrest control from us.

It’s become something of a classic science-fiction storyline: The systems calculate that they need to take a different path than we humans have envisioned. Consider this passage from that New Scientist story: “The test also shines light on what it means for humans to be conscious. What robots can never have, which humans have is phenomenological consciousness: ‘the first-hand experience of conscious thought,’ as Justin Hart of the University of British Columbia in Vancouver, Canada, puts it. It represents the subtle difference between actually experiencing a sunrise and merely having visual cortex neurons firing in a way that represents a sunrise. Without it, robots are mere ‘philosophical zombies,’ capable of emulating consciousness but never truly possessing it.”

I suppose that was intended to be comforting to its human readers, suggesting that consciousness will always keep humans one big step beyond computers. But another way to look at it is that these systems will eventually have the ability to think any thoughts humans can, but without our moral compass. So the machines, confronted by a starving population and an agricultural system that is maxed out, might conclude that a sharp population reduction is the solution — and that the nuclear power plants within its control offer a way to achieve it.

You can forget Isaac Asimov’s Three Laws of Robotics. The United Nations has already attempted to set rules for battlefield robots that can decide on their own when it’s a good idea to kill people.

There is a subtle line that shouldn’t be crossed with artificial intelligence. Making Siri smarter so that she understands questions better and delivers more germane answers is welcome. But what about letting her decide to delete apps that are never used or add some that your history suggests you’d like? What if she sees from your calendar that you’re on a critical deadline this afternoon and decides to prevent you from launching distracting games when you should be working?
Engineers are not the best at setting limits. They are much better suited — both in terms of temperament and intellectual curiosity — to seeing how far they can push limits. That’s admirable, except when its results move from C3PO to HAL 9000 to Star Trek: TNG’s Lore.

When superior engineering truly engineers something superior — superior to the engineers — can disasters imagined in science fiction become science fact?
Computerworld: http://http://bit.ly/1NrmcMm

 

« How Companies Are Fighting Off Spies and Hackers
Top Risk Management Concerns: Survey Results »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

DCL Search & Select

DCL Search & Select

DCL Search & Selection connect candidates to the best companies in the IT Security, Telco, UC, Outsourcing, ERP, Audit & Control markets.

Cloudbric

Cloudbric

Cloudbric is a cloud-based web security service, offering award-winning WAF, DDoS protection, and SSL, all in a full-service package.

OPSWAT

OPSWAT

OPSWAT is a software company that provides solutions to secure and manage IT infrastructure.

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

Neowave

Neowave

Neowave designs, manufactures and markets strong authentication solutions based on smart card components and digital certificates.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Control System Cyber Security Association International (CS2AI)

Control System Cyber Security Association International (CS2AI)

CS2AI is the premier global not for profit workforce development organization supporting professionals of all levels charged with securing control systems.

CYOSS

CYOSS

CYOSS, an ESG Group company, is a specialist in Cyber Security and Data Analytics. We focus on the opportunities of a networked world and make security risks manageable.

Tide Foundation

Tide Foundation

Tide's breakthrough multi-party-cryptography enables TRUE-zero-trust technology that unlocks cyber-herd immunity.

Opticks Security

Opticks Security

Opticks provides fraud detection and monitoring solutions for leading brands. agencies and networks. Our relentless mission is to deliver reliable and innovative software to beat digital fraud.

CypherEye

CypherEye

CypherEye is a next generation trust platform that advances the current state of Multi-factor Authentication (MFA) to enable highly secure, private and auditable cyber-transactions.

Arsen Cybersecurity

Arsen Cybersecurity

Arsen is a French cybersecurity startup, dedicated to enhancing human behaviors in cybersecurity.

Jot Digital

Jot Digital

Jot Digital is a full-service technology company specializing in digital engineering, application modernization and business transformation.