Video Game Imagines Humans Relying On Robots

In the 1950s, Isaac Asimov imagined a future in which sentient robots are built to serve and protect humans, but end up doing the opposite.

Almost seven decades later, artificial intelligence and robotics technologies have brought that scenario closer to the realms of possibility.

Detroit: Become Human, a narrative adventure from experimental studio Quantic Dreams is the latest work to imagine the consequences of relying on such super smart machines.

Set several years in the future, the game takes place in a world where androids have taken over most menial tasks and humans are figuring out what to do with all their leisure time.

The major manufacturer of Replicants, CyberLife, says its machines are safe and under control, and everyone is happy to trust them. But when a small group start to show human-like awareness, fear and resentment grow. Detroit: Become Human gives players control over several of these awakened droids as they form a kind of underground movement and start demanding some rights.

The idea for the game span out from a tech demo named Kara, produced by Quantic Dream in 2012. It showed a robot on a production line who gains sentience as she’s put together. The company’s creative director, David Cage, saw promise in the concept and inspired by the theories of futurist author and scientist Ray Kurzweil, started working on a full game around the idea of droids developing emotions.

In 2016, the company produced a trailer showing an AI cop named Connor attempting to pacify another android who has taken a young girl hostage. The trailer shows several outcomes, depending on player actions, but all emphasise the themes of sentience and emotion, and the potentially deadly friction between humans and robots.

For E3 2017, Quantic Dream revealed a new sequence from the game in which another android character named Marcus has joined a group of rogue robots who have formed a refuge known as Jericho.

They want humans to acknowledge them as equals, to stop exploiting androids as cheap labour, but they’re not sure how to get their message across. Marcus turns out to be a valuable ally: he has the ability to “convert” other androids, cutting them lose from CyberLife control and turning them into thinking beings, just by touching them – one of many subtle religious allusions that seem to litter the game.

The irony of human players taking control of android characters who are rebelling against human masters with ideas about control, subservience, reality and humanity, makes it worth waiting for.

Guardian

You Might Aslo Read:

Virtual Reality – Just Getting Started:

 

« The GDPR Effect On Brexit
Get Ready To Be Dazzled By The GDPR Professionals »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

2|SEC Consulting (2-SEC)

2|SEC Consulting (2-SEC)

At 2|SEC Consulting, we deliver an end-to-end service of cyber and information security solutions which are tailored to each client’s exact security needs.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

Norwegian Information Security laboratory (NISlab)

Norwegian Information Security laboratory (NISlab)

NISlab conducts international competitive research in information and cyber security and operates study programs in this area.

Cybercrime Investigation & Coordinating Center (CICC)

Cybercrime Investigation & Coordinating Center (CICC)

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

CARICERT

CARICERT

CARICERT is the National Cyber Emergency Response Team of Curacao in the Caribbean.

ZeroNorth

ZeroNorth

ZeroNorth provides a new approach to improve software and infrastructure security, simplify continuous compliance reporting and to create more cost-effective risk management programs.

OpenZeppelin

OpenZeppelin

OpenZeppelin builds developer tools and performs security audits for distributed systems that power multimillion-dollar economies.

Cloud GRC

Cloud GRC

Cloud GRC is an innovative cybersecurity company with solutions and expertise in Cybersecurity Strategies & Frameworks, Threat & Risk Assessment, Cloud Security, and Regulatory Compliance Requirements

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

Loki Labs

Loki Labs

Loki Labs provides expert cyber security solutions and services, including vulnerability assessments & penetration testing, emergency incident response, and managed security.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

Cybolt

Cybolt

Cybolt helps companies, organizations, and governments manage digital risks and live in an environment of confidence and certainty.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Helix Security Services

Helix Security Services

Helix Security provides IT & information security consultancy to government and businesses across New Zealand.

Liberty Technology

Liberty Technology

Liberty Technology has a host of highly trained, certified experts who assist our clients with immediate remote support as well as on-site service.

Softanics

Softanics

Softanics’ ArmDot protects .NET apps with advanced obfuscation, control flow protection, and virtualization, securing code against reverse engineering without requiring agents or environment changes.