The Inevitable Rise Of Artificial Intelligence

A thousand tech industry names have publicly called for a six-month halt to training new AI systems to give the industry time to assess the risks.

AI seems to have reached an inflexion point where it is finally powerful enough to really capture the public imagination. Politicians are keen to capitalise on the potential of these systems to drive economic growth and the low carbon economy, and ordinary citizens are signing up to see what they can do with the technology.

However, as these systems get more powerful and widespread, the risks associated with them also become more significant. The Future of Life Institute issued its open letter calling for a halt because it is concerned that the risks are not yet understood and so cannot yet be properly controlled.

Can You Put The Genie Back In The Bottle?

We can bet that any moratorium would not be completely respected. Chinese and potentially even American innovators - who are the origin of the main advances in this area - would find it difficult to accept a long period of potential commercial disadvantage.

The developers do seem to be working hard to identify and address risks, but the conflicts of interests in ‘marking their own homework’ are clear.

The technical report accompanying GPT-4 addresses risks ranging from hallucinations (where the system provides inaccurate information), to the proliferation of weapons, to privacy and cybersecurity. However, the descriptions of the risks are limited, as is the information provided about how the system was developed. There is, for example, nothing about future energy requirements for AI and the potential impact of that on international climate change commitments.

How Much Do We Know About The Risks Of AI?

We know that the dataset used to train the system is likely to contain personal data that may not have been lawfully obtained as well as information that is the intellectual property of rights owners who have not provided permission. We know that people are only now starting to experiment with the ways the tools can be used - and without understanding that, it’s simply impossible to assess all the risks.

The debate reinforces the need for governments to take up the subject more quickly.

The EU is making progress on the AI Act, which aims to regulate the use of certain types of AI. However, there is no date for it to be transposed into national laws yet and other countries, including the UK, have no equivalent.

Laws like the AI Act provide ‘guard rails’ to help developers consider wider social and economic risks, but the problems envisaged by the signatories to the open letter go far beyond what can realistically be worked through in a six month development moratorium.

Regulators, politicians and think tanks need to consider what model of society we want to implement and how AI will be incorporated into that. The rise of AI is inevitable, but it requires systemic changes including retraining millions of adults and finding roles for those whose work opportunities are displaced by technology.

Camilla Winlo is Head of Data Privacy at Gemserv

Nicolas Cambolin Global Director of Data Intelligence at Talan

You Might Also Read: 

Leveraging Data Privacy For Artificial Intelligence:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

 

« Understanding The Incident Response Lifecycle
The Cybersecurity Threat To Railways »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

Oracle Cloud Security

Oracle Cloud Security

Oracle’s cloud security solutions enable organizations to implement and manage consistent security policies across the hybrid data center.

Atlantic Council Digital Forensic Research Lab (DFRLab)

Atlantic Council Digital Forensic Research Lab (DFRLab)

The Atlantic Council’s DFRLab has operationalized the study of disinformation by exposing falsehoods and fake news, documenting human rights abuses, and building digital resilience worldwide.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

CyVolve

CyVolve

Cyvolve is the next great leap forward in data security, ensuring constant encryption and pervasive control over all your data.

Delfigo Security

Delfigo Security

Delfigo Security, a pioneer in intelligent authentication, provides a strong, multi-factor authentication solution to prevent identity theft and reduce fraud.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

DataFleets

DataFleets

DataFleets is a privacy-preserving data engine that unifies distributed data for rapid access, agile analytics, and automated compliance.

Rede Nacional CSIRT

Rede Nacional CSIRT

Rede Nacional CSIRT is a national network of CSIRTs in Portugal aimed at cooperation and mutual assistance in the handling of incidents and in the sharing of good security practices.

Risk Strategies

Risk Strategies

Risk Strategies is a leading specialty risk management consultancy and insurance broker offering smarter, practical approaches to risk mitigation including Cyber Liability insurance.

Ping Identity

Ping Identity

At Ping Identity, we believe in making digital experiences both secure and seamless for all users, without compromise. That’s digital freedom.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

Viatel Technology Group

Viatel Technology Group

Viatel Technology Group is a complete digital services provider. We have over 26 years’ experience delivering fully managed security, networking, cloud and communications services.

CyberMass

CyberMass

CyberMass provides Cyber Advisory/Consulting, Professional and Managed Services offering complete cybersecurity as a service protection to businesses.