Famous Musicians Want To Stop AI - Generated Music

Hundreds of musicians have joined with the Artist Rights Alliance (ARA) to condemn the excessive use of  Artificial Intelligence (AI) in the music industry. In an open letter organised by campaign group the Artists' Rights Alliance say AI will "infringe upon our rights and devalue the rights of human artists" if it is used irresponsibly.

American singer Billie Eilish, Katy Perry, Elvis Costello, and UK star Engelbert Humperdinck are among 200 artists calling for the "predatory" use of AI in the music industry to be stopped, due to concerns that this AI will replace human artists and ‘substantially dilute’ royalty pools.

They claim the way that artists' work is used to train some AI models and systems was "an assault on human creativity", and warned it was being used to "violate creators' rights, and destroy the music ecosystem".

Tom Kiehl, interim head of industry association UK Music, said he shared the concerns of artists who worry their work is being used to train AI without their permission. "This amounts to music laundering and any companies engaged in these practices must stop and take a more responsible approach to our music industry," he said. 

"Ensuring artists have given their consent and receive appropriate credit and compensation for the use of their work on AI systems must be the foundation to a more responsible approach."

Artists spanning creative disciplines and genres have spoken out about how AI is used in recent months, after a song which used AI to mimic the voices of Drake and The Weeknd went viral online.

Other artists have since spoken out about it, with Sting saying he believes musicians face "a battle" to defend their work against the rise of songs written by AI. "The building blocks of music belong to us, to human beings," he said.

But not all musicians oppose developments in or use of AI across the music industry, and electronic artist Grimes and DJ David Guetta are among those backing the use of such AI tools.

Other creative sectors have taken action in response to concerns about AI.

Last year, thousands of writers signed a letter written by the Authors Guild, which called on the likes of OpenAI, Alphabet and Meta to stop using their work to train AI models without “consent, credit or compensation”.

The New York Time is currently engaged is a high stakes  lawsuit against OpenAI and Microsoft, in a claim that AI chatbots made by these companies, including the popular ChatGPT, are trained on millions of articles published by the US media outlet.

BBC     |     Medium     |     Slashdot     |     Silicon Republic     |     Yahoo   |   Independent     |     Silicon Angle     |  

Complex

Image: Ideogam

You Might Also Read:

Ed Sheeran's Music Pirate Jailed:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Top 10 Emerging Cyber Security Threats By 2030
The US & Britain Reach Agreement On AI Regulation  »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Defense Advanced Research Projects Agency (DARPA)

Defense Advanced Research Projects Agency (DARPA)

DARPA's mission is to develop breakthrough technologies for national security. The Information Innovation Office undertakes cyber security activities.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

Focal Point Data Risk

Focal Point Data Risk

Focal Point is a pure-play data risk management provider capable of offering end-to-end consulting, implementation, and training services.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

LaoCERT

LaoCERT

LaoCERT is the national Computer Incident Response Team for Laos.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

Keyless Technologies

Keyless Technologies

Simple, secure, and interoperable authentication. Keyless offers unmatched security, privacy and usability, while reducing risk and infrastructure costs.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

Qascom

Qascom

Qascom is an engineering company offering security solutions in satellite navigation and space cybersecurity. We are one of the European key players in GNSS authentication and security.

FourNet

FourNet

FourNet is an award-winning provider of cloud and managed services; we work closely with our clients to enable digital transformation across their organisation.

Green Enterprise Solutions

Green Enterprise Solutions

Green Enterprise Solutions are a Namibian company providing Information and Communication Technology (ICT) services to corporate Namibia.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

Runecast Solutions

Runecast Solutions

Runecast Solutions is a global leader in AI-powered risk mitigation, security, continuous compliance and more efficient IT operations management.