Hollywood Stars Strike Over AI Human Replacements

Hollywood actors have joined a strike by screenwriters in the industry's biggest shutdown for more than 60 years, since 1960. Writers and actors are concerned about generative Artificial Intelligence (AI) tools replacing their roles in film and TV. Some 160,000 performers recently stopped work in Los Angeles, bringing to a halt most US film and TV productions.

The Screen Actors Guild (SAG) wants the industry to agree to a fairer split of profits and better working conditions and it wants actors protection from being replaced by AI digital replicas.

While the strike lasts, actors cannot appear in films or even promote movies that they have already made and therefore Holly wood stars Cillian Murphy, Matt Damon and Emily Blunt left the premiere of Christopher Nolan's Oppenheimer in London when the strike began. The film director, Christopher Nolan, told the film audience that they were "off to write their picket signs", saying he was in supportof the strike. Picketing has taken place outside the California headquarters of Netflix, before moving on to Paramount, Warner Bros and Disney.  

A number of actors have used on Instagram to voice their support for the strike, including Better Call Saul star Bob Odenkirk, Sex and the City's Cynthia Nixon and Hollywood veteran Jamie Lee Curtis. 

Screenwriters fear AI could be used to churn out a rough first draft with a few simple prompts and writers may then be hired to improve such drafts at a lower pay rate.

  • AI could be used to craft outlines for stories, fill in scenes and even come up with mock-up drafts.
  • AI could be used to replace background actors serve as the backdrop of busy scenes and crowd shots in film and TV projects, filling up empty streets and the background to social get togethers.   

To engage with these issues about the use of AI, the major studios have offered what they call a "ground-breaking proposal" that would protect the digital likeness of actors and require their consent when digital replicas are used in performances, or alterations are made.

BBC:      Independent:       Rolling Stone:     NextTV:      The Verge:    Verdict:      Image: Ali Pazani

You Might Also Read: 

AI Can Turn Hollywood Stars Into Pornographic Actors:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 



 

« Britain's Biggest Hospital Held To Ransom
Setting Up An Operational Resilience Framework »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

EdgeWave

EdgeWave

EdgeWave provides simple but highly effective data security and advanced threat protection in solutions that are affordable, scalable and easy to use.

Cycura

Cycura

Cycura provide advanced, customized, and confidential cyber security services, cyber investigation services, and digital forensic services to governments, companies, and organizations.

Bio-Morphis

Bio-Morphis

Bio-Morphis Reflex solution is a paradigm shift in the approach to information systems security.

aDolus Technology

aDolus Technology

aDolus delivers a robust solution for safeguarding against counterfeit or malicious software and firmware in mission-critical systems.

Amadeus Capital Partners

Amadeus Capital Partners

Amadeus Capital Partners offers over 20 years’ experience in technology investment. Our areas of focus include AI & machine learning and cyber security.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

Future Technology Systems Company (FutureTEC)

Future Technology Systems Company (FutureTEC)

FutureTEC is a leading Information Technology Solutions Provider, delivering world-class Information Security, Information Management, and Business Solutions.

Commonwealth Cyber Initiative (CCI)

Commonwealth Cyber Initiative (CCI)

The Commonwealth Cyber Initiative is establishing Virginia as a global center of excellence at the intersection of security, autonomous systems, and data.

evolutionQ

evolutionQ

evolutionQ delivers quantum-risk management strategies and robust cybersecurity tools designed to be safe in an era with quantum computing technologies.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

Swish Data Corp.

Swish Data Corp.

Swish delivers when the problems are complex, requirements are difficult, and the mission is absolutely critical.

Paubox

Paubox

Paubox offers secure, HIPAA compliant email and marketing solutions to fit the needs of modern healthcare organizations of every size.

PyNet Labs

PyNet Labs

PyNet Labs is a Training Company serving corporates as well as individuals across the world with ever-changing IT and technology training.

Tsaaro Academy

Tsaaro Academy

Tsaaro Academy is a unique privacy certification training platform and here you earn a privacy certification CEH, CISM and DPO from India’s No.1 Privacy training platform.

US Cyber Games

US Cyber Games

US Cyber Games is committed to inform and inspire the broader community on ways to develop tomorrow’s cybersecurity workforce.

CODA Intelligence

CODA Intelligence

CODA's AI-powered attack surface management platform helps you sort out the important remediations needed in order to avoid exploits on your systems.