Hollywood Stars Strike Over AI Human Replacements

Hollywood actors have joined a strike by screenwriters in the industry's biggest shutdown for more than 60 years, since 1960. Writers and actors are concerned about generative Artificial Intelligence (AI) tools replacing their roles in film and TV. Some 160,000 performers recently stopped work in Los Angeles, bringing to a halt most US film and TV productions.

The Screen Actors Guild (SAG) wants the industry to agree to a fairer split of profits and better working conditions and it wants actors protection from being replaced by AI digital replicas.

While the strike lasts, actors cannot appear in films or even promote movies that they have already made and therefore Holly wood stars Cillian Murphy, Matt Damon and Emily Blunt left the premiere of Christopher Nolan's Oppenheimer in London when the strike began. The film director, Christopher Nolan, told the film audience that they were "off to write their picket signs", saying he was in supportof the strike. Picketing has taken place outside the California headquarters of Netflix, before moving on to Paramount, Warner Bros and Disney.  

A number of actors have used on Instagram to voice their support for the strike, including Better Call Saul star Bob Odenkirk, Sex and the City's Cynthia Nixon and Hollywood veteran Jamie Lee Curtis. 

Screenwriters fear AI could be used to churn out a rough first draft with a few simple prompts and writers may then be hired to improve such drafts at a lower pay rate.

  • AI could be used to craft outlines for stories, fill in scenes and even come up with mock-up drafts.
  • AI could be used to replace background actors serve as the backdrop of busy scenes and crowd shots in film and TV projects, filling up empty streets and the background to social get togethers.   

To engage with these issues about the use of AI, the major studios have offered what they call a "ground-breaking proposal" that would protect the digital likeness of actors and require their consent when digital replicas are used in performances, or alterations are made.

BBC:      Independent:       Rolling Stone:     NextTV:      The Verge:    Verdict:      Image: Ali Pazani

You Might Also Read: 

AI Can Turn Hollywood Stars Into Pornographic Actors:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 



 

« Britain's Biggest Hospital Held To Ransom
Setting Up An Operational Resilience Framework »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

French Expert Center Against Cybercrime (CECyF)

French Expert Center Against Cybercrime (CECyF)

CECyF is a centre of excellence for countering cybercrime in France.

Sponge

Sponge

Sponge is a world-renowned digital learning provider on a mission to make learning unforgettable.

Recruit.net

Recruit.net

Recruit.net allows job seekers to instantly find millions of jobs from thousands of web sites with a single search.

AttackIQ

AttackIQ

AttackIQ delivers continuous validation of your enterprise security program so you can strengthen your security posture and your response capabilities.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

Mayhem

Mayhem

Mayhem, by ForAllSecure, is a developer-first application and API security testing solution.

Security Weaver

Security Weaver

Security Weaver is a leading provider of governance, risk and compliance management (GRCM) software.

Urbane Security

Urbane Security

Urbane Security is a premier information security consultancy empowering the Fortune 500, small and medium enterprise, and high-tech startups.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

Cybeta

Cybeta

Cybeta's actionable cybersecurity intelligence keeps your business safe with strategic and operational security recommendations that prevent breaches.

Infosec Cloud

Infosec Cloud

Infosec Cloud is a specialist Cyber Security company offering fully managed Training & Testing Services in addition to market leading Cyber Security technology and accredited professional services.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

Path Forward IT

Path Forward IT

Path Forward IT has been troubleshooting, architecting, migrating, protecting, and securing IT environments for businesses across the USA since 2002.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

Veracity Trust Network

Veracity Trust Network

Veracity Trust Network safeguards organisations from the threat of bot attacks on their public facing platforms.