Hollywood Stars Strike Over AI Human Replacements

Hollywood actors have joined a strike by screenwriters in the industry's biggest shutdown for more than 60 years, since 1960. Writers and actors are concerned about generative Artificial Intelligence (AI) tools replacing their roles in film and TV. Some 160,000 performers recently stopped work in Los Angeles, bringing to a halt most US film and TV productions.

The Screen Actors Guild (SAG) wants the industry to agree to a fairer split of profits and better working conditions and it wants actors protection from being replaced by AI digital replicas.

While the strike lasts, actors cannot appear in films or even promote movies that they have already made and therefore Holly wood stars Cillian Murphy, Matt Damon and Emily Blunt left the premiere of Christopher Nolan's Oppenheimer in London when the strike began. The film director, Christopher Nolan, told the film audience that they were "off to write their picket signs", saying he was in supportof the strike. Picketing has taken place outside the California headquarters of Netflix, before moving on to Paramount, Warner Bros and Disney.  

A number of actors have used on Instagram to voice their support for the strike, including Better Call Saul star Bob Odenkirk, Sex and the City's Cynthia Nixon and Hollywood veteran Jamie Lee Curtis. 

Screenwriters fear AI could be used to churn out a rough first draft with a few simple prompts and writers may then be hired to improve such drafts at a lower pay rate.

  • AI could be used to craft outlines for stories, fill in scenes and even come up with mock-up drafts.
  • AI could be used to replace background actors serve as the backdrop of busy scenes and crowd shots in film and TV projects, filling up empty streets and the background to social get togethers.   

To engage with these issues about the use of AI, the major studios have offered what they call a "ground-breaking proposal" that would protect the digital likeness of actors and require their consent when digital replicas are used in performances, or alterations are made.

BBC:      Independent:       Rolling Stone:     NextTV:      The Verge:    Verdict:      Image: Ali Pazani

You Might Also Read: 

AI Can Turn Hollywood Stars Into Pornographic Actors:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 



 

« Britain's Biggest Hospital Held To Ransom
Setting Up An Operational Resilience Framework »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyfor

Cyfor

Cyfor provides digital forensics and eDiscovery in civil, criminal, intellectual property, litigation and dispute resolution investigations.

SecureWorks

SecureWorks

SecureWorks provides intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

Quantea

Quantea

Our multi-patented solutions - QP Series Network Analytics Accelerator appliance and PureInsight Analytics Software Suite allows you to capture, analyze, store, replay, network traffic data.

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling & Data Destruction

Sadoff E-Recycling and Data Destruction protect the environment and your data with proven and trusted electronics recycling and data destruction services.

IdentityIQ

IdentityIQ

IdentityIQ is a US-based identity theft and credit protection company designed to help users stay on top identity thieves and data breaches.

Predatech

Predatech

A cyber security consultancy offering a range of services, including CREST accredited penetration testing, vulnerability assessments and certifications incl. Cyber Essentials & Cyber Essentials Plus.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

GoPro Consultants

GoPro Consultants

GoPro Consultants is an IT Consultancy and IT Managed services provider Globally with immeasurable expertise of IT professionals in Hardware/Support & Consultancy and Project Planning.

Aptum

Aptum

Aptum is a global hybrid multi-cloud managed service provider delivering complex and high-performance cloud solutions with an integrated secure network.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

Gutsy

Gutsy

Gutsy uses process mining to help organizations visualize and analyze their complex security processes to understand how they actually run, based on observable event data.

Resemble AI

Resemble AI

Resemble AI is an innovator in Generative Voice AI technology and tools to combat AI fraud including audio watermarking and deepfake detection.

Cybermindz

Cybermindz

Many cyber security professionals are under sustained and increasing stress. We set about providing direct support to restore and rebuild emotional and cognitive health.

SKADI Cyber Defense

SKADI Cyber Defense

At SKADI Cyber Defense, we specialize in enterprise-grade cybersecurity solutions tailored for small to medium businesses.