Hollywood Stars Strike Over AI Human Replacements

Hollywood actors have joined a strike by screenwriters in the industry's biggest shutdown for more than 60 years, since 1960. Writers and actors are concerned about generative Artificial Intelligence (AI) tools replacing their roles in film and TV. Some 160,000 performers recently stopped work in Los Angeles, bringing to a halt most US film and TV productions.

The Screen Actors Guild (SAG) wants the industry to agree to a fairer split of profits and better working conditions and it wants actors protection from being replaced by AI digital replicas.

While the strike lasts, actors cannot appear in films or even promote movies that they have already made and therefore Holly wood stars Cillian Murphy, Matt Damon and Emily Blunt left the premiere of Christopher Nolan's Oppenheimer in London when the strike began. The film director, Christopher Nolan, told the film audience that they were "off to write their picket signs", saying he was in supportof the strike. Picketing has taken place outside the California headquarters of Netflix, before moving on to Paramount, Warner Bros and Disney.  

A number of actors have used on Instagram to voice their support for the strike, including Better Call Saul star Bob Odenkirk, Sex and the City's Cynthia Nixon and Hollywood veteran Jamie Lee Curtis. 

Screenwriters fear AI could be used to churn out a rough first draft with a few simple prompts and writers may then be hired to improve such drafts at a lower pay rate.

  • AI could be used to craft outlines for stories, fill in scenes and even come up with mock-up drafts.
  • AI could be used to replace background actors serve as the backdrop of busy scenes and crowd shots in film and TV projects, filling up empty streets and the background to social get togethers.   

To engage with these issues about the use of AI, the major studios have offered what they call a "ground-breaking proposal" that would protect the digital likeness of actors and require their consent when digital replicas are used in performances, or alterations are made.

BBC:      Independent:       Rolling Stone:     NextTV:      The Verge:    Verdict:      Image: Ali Pazani

You Might Also Read: 

AI Can Turn Hollywood Stars Into Pornographic Actors:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 



 

« Britain's Biggest Hospital Held To Ransom
Setting Up An Operational Resilience Framework »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

KeepItSafe

KeepItSafe

KeepItSafe is a premium, white-glove service for online backup, disaster recovery and business continuity

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

ISMS Accreditation Center (ISMS-AC)

ISMS Accreditation Center (ISMS-AC)

ISMS-AC is the national accreditation body for Japan. The directory of members provides details of organisations offering certification services for ISO 27001.

RFA

RFA

RFA is a unique IT, financial cloud and managed cyber-security provider to the financial services and alternative investment sectors.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Veridium

Veridium

Veridium is a leader in single step - multi factor biometric authentication, designed to safeguard enterprises’ most critical assets.

01 Communique Laboratory

01 Communique Laboratory

01 Communique Laboratory is an innovation leader in the new realm of Post-Quantum Cyber Security.

SessionGuardian

SessionGuardian

SessionGuardian (previously SecureReview) is the world's first and only technology which ensures second-by-second biometric identity verification of your remote user, from log on to log off.

PT Prima Cyber Solusi

PT Prima Cyber Solusi

PT Prima Cyber Solusi is focused on protecting your business from the massive and devastating impacts that cyber-attacks may cause.

Secure Cyber Defense

Secure Cyber Defense

Secure Cyber Defense provides expert cybersecurity consulting and managed detection and response services to companies, local government, schools and universities.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.