Video Game Imagines Humans Relying On Robots

In the 1950s, Isaac Asimov imagined a future in which sentient robots are built to serve and protect humans, but end up doing the opposite.

Almost seven decades later, artificial intelligence and robotics technologies have brought that scenario closer to the realms of possibility.

Detroit: Become Human, a narrative adventure from experimental studio Quantic Dreams is the latest work to imagine the consequences of relying on such super smart machines.

Set several years in the future, the game takes place in a world where androids have taken over most menial tasks and humans are figuring out what to do with all their leisure time.

The major manufacturer of Replicants, CyberLife, says its machines are safe and under control, and everyone is happy to trust them. But when a small group start to show human-like awareness, fear and resentment grow. Detroit: Become Human gives players control over several of these awakened droids as they form a kind of underground movement and start demanding some rights.

The idea for the game span out from a tech demo named Kara, produced by Quantic Dream in 2012. It showed a robot on a production line who gains sentience as she’s put together. The company’s creative director, David Cage, saw promise in the concept and inspired by the theories of futurist author and scientist Ray Kurzweil, started working on a full game around the idea of droids developing emotions.

In 2016, the company produced a trailer showing an AI cop named Connor attempting to pacify another android who has taken a young girl hostage. The trailer shows several outcomes, depending on player actions, but all emphasise the themes of sentience and emotion, and the potentially deadly friction between humans and robots.

For E3 2017, Quantic Dream revealed a new sequence from the game in which another android character named Marcus has joined a group of rogue robots who have formed a refuge known as Jericho.

They want humans to acknowledge them as equals, to stop exploiting androids as cheap labour, but they’re not sure how to get their message across. Marcus turns out to be a valuable ally: he has the ability to “convert” other androids, cutting them lose from CyberLife control and turning them into thinking beings, just by touching them – one of many subtle religious allusions that seem to litter the game.

The irony of human players taking control of android characters who are rebelling against human masters with ideas about control, subservience, reality and humanity, makes it worth waiting for.

Guardian

You Might Aslo Read:

Virtual Reality – Just Getting Started:

 

« The GDPR Effect On Brexit
Get Ready To Be Dazzled By The GDPR Professionals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Foundation for Strategic Research (FRS)

Foundation for Strategic Research (FRS)

The Foundation for Strategic Research is France's main independent think tank on strategic, defense and security issues. Cyber security is covered as part of the study areas.

Clifford Chance

Clifford Chance

Clifford Chance are one of the world's pre-eminent law firms with resources across five continents. Practice areas include Cyber Security & Information Protection

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

National Trading Standards eCrime Team (NTSeCT) - United Kingdom

The National Trading Standards eCrime Team tackles online consumer scams, rip-offs and fraud, as well as those committed by text or email.

CionSystems

CionSystems

CionSystems provides identity, access and authentication solutions to improve security and streamline IT infrastructure management.

Azeti Networks

Azeti Networks

Azeti Networks is a global provider of IoT technology to a variety of verticals including telecomms, oil/gas, manufacturing, finance and healthcare.

Preempt Security

Preempt Security

The Preempt Platform delivers adaptive threat prevention that continuously preempts threats based on identity, behavior and risk.

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

Department of Energy - Cybersecurity, Energy Security, and Emergency Response (CESER)

The Office of Cybersecurity, Energy Security, and Emergency Response (CESER) addresses the emerging threats of tomorrow while protecting the reliable flow of energy to Americans today.

Fugue

Fugue

Fugue ensures cloud infrastructure stays in continuous compliance with enterprise security policies.

SPARTA Consortium

SPARTA Consortium

SPARTA tackles hard innovation challenges, leading the way in building transformative capabilities and forming a world-leading cybersecurity competence network across the EU.

Dashlane

Dashlane

Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.

Moviri

Moviri

Moviri combines security technology engineering, intelligence expertise and our data science DNA to help companies manage digital risk end-to-end.

Outseer

Outseer

Outseer is a leading technology company in the fight against payments fraud. Outseer reliably determines authentic customers from fraudulent behavior.

Anametric

Anametric

Anametric is developing new technologies and devices for chip scale quantum photonics, with a focus on cybersecurity.

Balance Theory

Balance Theory

Balance Theory provides the knowledge infrastructure and collaboration center for the cybersecurity community. A networked community to build better cybersecurity outcomes.

Foghorn Consulting

Foghorn Consulting

Foghorn can analyze your cloud to enhance performance and security, while reducing costs. Based on AWS’ 6 Pillars, our AWS WAFR Certified Engineers Will Identify Areas of Improvement.

Nicos AG

Nicos AG

Nicos AG specializes in secure, global data communication.