Hamlet’s IP & AI

To regulate or not regulate that is the question.  Whether it is nobler to suffer the slings and arrows of massive IP theft or to stifle a truly revolutionary technological happening.  

Ok, it’s not Shakespeare.  But, it is the very essence of what the tortured Hamlet of the DC bureaucracy is currently putting itself through as it deals with IP and Artificial Intelligence.  Whatever AI is?

Beware The Ides Of Section 230

The first time artificial intelligence was mentioned was in the mid-1950’s. It was based on the premise of getting machines to simulate human intelligence.  Sci-fi stuff in that period. Same with a concept called Cyber space.

Flash forward, when I was on the Hill in 1996, Congress was reviewing that nascent technology Cyber space - or the Internet as everyone called it - and its potential regulation.  Thanks to lobbying focused on platform providers concerns about being sued for outsider placed content, a clause was put into protect them – Section 230 of the Communications Decency Act.  No one at the time could be against decency – nor could predict the political, economic, and social explosion surrounding that decision. 

A simple clause, Section 230, turning into a law from Mount Sinai – thou shalt not regulate the internet.  It unleased a generation of unprecedented and unbridled development of an entirely new domain.  Only in the past few years has the American body politic thought to ask - have we let this all go too far

Though This Seems Madness…

I believe the main DC political concern over AI is driven by the challenges of cyber space - the buyer’s remorse of “we should have done some type regulation sooner.” 

So, AI is now a DC political target.  An imagined job stealing, militarily dangerous, opinion shaping creature causing fear and loathing.  Even if no one quite understands what it is. And - not helping - the often “true believer guys” pitching it have exaggerated its real capability - so far. 

In the final analysis, AI is a tool.  But a different kind of tool. Not a hammer. Not a computer.   A shape shifting 21st century tool. 

At its simplest, AI is software with algorithms based on code produced by a bunch of White middle class young men in their late 20’s with all their flaws and biases – and with all the zero day challenges that could be expected from such

But it is a software with algorithms that can “learn” – it adopts and adapts based on the information it can intake.  How much and how well is yet to be determined. But, so far, promising.

Think of it as a child learning as it grows by experiences, reading, and discussion.  Diving into the “data lake” it has available – good and bad information - and learning how to, say, think about things.  Each child with perhaps a different “software” to take in and process the experiences at a different pace and expertise.

Who Steals My Purse…

For those of us who toil in the information business –lawyers, teachers, doctors, reporters, actors, writers – we are particularly absorbed by AI.

First concern - Is it going to replace us or is it a tool to enhance our work?   That is a “time will tell” question. 

 And, contrary to most of history, it is “amusing” to watch the “white collar” guys sweating a major technological change.  Still, remember: just because we now stream information doesn’t mean libraries have totally gone away.  They have adapted and we will too.

The other big question - and a more justifiable one to my mind - is that of the Intellectual Property (IP) the AI is using to build its knowledge and produce output. Who’s paying for this IP - or should they?

From one standpoint, AI may participating in the greatest IP theft of all times – bigger than Guttenberg’s press (plus all those poor brown collared scrivener monks out of work!)

And while this is a real business and intellectual concern, this may be a moment for us to determine exactly what rules go for IP.

We are crying wolf to some extent having allowed a generation of cyber space “fair use doctrine” - read IP thievery - that ranges from free uploaded music and videos to every article not lying behind a firewall.  

Still, there are some rules guiding IP ownership. And, in my view, rather antiquated. Thanks to a former rock star and 1990’s Congressman, Sonny Bono, America has the Sonny Bono Copyright Term Extension Act of 1998. 

 The act “extends the duration of copyright in a work to the life of the author and 70 years after the author's death.” And it also “extends the duration of copyright in anonymous or pseudonymous works or works made for hire… to 95 years from the year of the first publication... or 120 years from the year of creation, whichever expires first.”

We live in the 21st century.  Is it still really sensible to have IP controls over an entire century? Will this also apply on the Moon and Mars for instance?  The current rules have got to go.

Is it equally sensible for someone to have their ideas appropriated and not be compensated for it?  No.  Simply no. The music industry decided a long time ago to charge per play.  Not a bad model for IP if workable. 

Alas Poor DC, What Should It Do?

First, the AI panicking driving whatever decision making in DC must stop.  AI is not some 12 foot tall, 800 pound monster. 

It is an evolving software which can be guided in development by sensible controls – like we didn’t do on the internet and are doing at the Pentagon. Rules for military development should not be the same for education. Think sectoral - not one size fits all.

Second, and to the point of this article, we need to think carefully about our IP laws.  Developed in the 19th century and reinforced in the 20th, they really don’t apply to an era where information is being produced in cyber space at the rate of a Library of Congress a second.

Third, the era of no compensation for IP must end.  It is thievery by the very definition of the word.  Pay for it.  You’ll no doubt pass on the costs. Welcome to Capitalism for all.

All’s Well That Ends Well?

Change is inevitable.  As the Bard said, “come what come may, time and the hour runs through the roughest day.”  

AI represents big change. Some will lose. Some will win. But I believe history shows more will win with such innovations. 

With the sure knowledge that AI will continue to develop and expand, DC must move beyond fear and loathing to provide solid guidance for AI and sensible rules of our time for IP.

Perhaps all will end well….

Image: Ideogram


Ronald A. Marks is a forty plus year national security veteran. A former CIA and Capitol Hill staffer, he was an IT executive and is current a member of the Council on Foreign Relations and  Visiting Professor at the Schar School of Policy and Government at George Mason University.


You Might Also Read: 

Time For Cyber Force:

___________________________________________________________________________________________

If you like this website and use the comprehensive 7,000-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« A Single Attack Disabled Half A Million Routers
The Devastating Effects Of A Man-in-the-Middle Attack »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

Vade Secure

Vade Secure

Vade Secure provides protection against the most sophisticated email scams such as phishing and spear phishing, malware and ransomware.

Netteam

Netteam

Netteam designs, implements and services networking solutions for companies of all sizes.

Oxford BioChronometrics

Oxford BioChronometrics

By building profiles based on electronically Defined Natural Attributes, or e-DNA, Oxford BioChronometrics protects digital networks, communities, individuals and other online assets from fraud.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

Elemendar

Elemendar

Elemendar Artificial Intelligence reads cyber threat reports written by humans and translates them into industry-standard, machine-readable and machine-actionable data.

ISMS Accreditation Center (ISMS-AC)

ISMS Accreditation Center (ISMS-AC)

ISMS-AC is the national accreditation body for Japan. The directory of members provides details of organisations offering certification services for ISO 27001.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

SecSign Technologies

SecSign Technologies

SecSign Technologies delivers user authentication, messaging, file sharing, and file storage with next generation security for company networks, websites, platforms, and devices.

BrainStorm

BrainStorm

BrainStorm Threat Defense takes a new human-focused approach to security awareness that traditional training lacks. It’s a cutting-edge platform to make your users more security savvy.

Antigen Security

Antigen Security

Antigen Security is a Digital Forensics, Incident Response and Recovery Engineering firm helping businesses and service providers prepare for, respond to, and recover from cyber threats.

Immunefi

Immunefi

Immunefi provides bug bounty hosting, consultation, and program management services to blockchain and smart contract projects.

NetApp

NetApp

The NetApp portfolio includes intelligent cloud services, data services, and storage infrastructure that helps organizations manage applications and data everywhere across hybrid cloud environments.

CYMAR

CYMAR

CYMAR The “CYBER” Smart Solution to offer sustainability and bring resilience to Global SMART Terminals and protect the supply chain of the World’s economy.

CYBRI

CYBRI

CYBRI is a cybersecurity company helping businesses detect and remediate mission-critical vulnerabilities before they get exploited by hackers.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.